x9: terminating thread group D0620 03:40:24.821755 949939 task_exit.go:204] [ 48519: 48527] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:24.821928 949939 task_exit.go:204] [ 48519: 48521] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:24.822031 949939 task_signals.go:204] [ 48522: 48526] Signal 48522, PID: 48526, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:24.822129 949939 task_exit.go:204] [ 48519: 48521] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.822271 949939 task_exit.go:204] [ 48519: 48521] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:24.822480 949939 task_exit.go:204] [ 48519: 48519] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:24.822732 949939 task_exit.go:204] [ 48522: 48524] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:24.823048 949939 task_exit.go:204] [ 48522: 48526] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:24.823556 949939 task_exit.go:204] [ 48522: 48522] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.823717 949939 task_exit.go:204] [ 48519: 48519] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.823844 949939 task_exit.go:204] [ 48522: 48524] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.823978 949939 task_exit.go:204] [ 48522: 48524] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:24.826248 949939 task_exit.go:204] [ 48483: 48501] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.826443 949939 task_exit.go:204] [ 48483: 48501] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:24.826688 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:24.826984 949939 task_exit.go:204] [ 48483: 48483] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:24 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) (async) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) (async) listen(r1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x10000, {{0xa, 0x4e24, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}}, 0x88) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5450, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) accept4$inet(r1, 0x0, 0x0, 0x0) (async) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:24.829182 949939 task_exit.go:204] [ 48519: 48527] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.829279 949939 task_exit.go:204] [ 48519: 48527] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:24.829409 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:24.829631 949939 task_exit.go:204] [ 48519: 48519] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:24 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) r3 = getegid() write$FUSE_ENTRY(r1, &(0x7f0000002180)={0x90, 0xffffffffffffffda, r2, {0x4, 0x1, 0x3f, 0x100000000, 0x9, 0x80000001, {0x0, 0x8, 0x80, 0x3, 0x2, 0x7fffffffffffffff, 0x10000, 0x9, 0xfa51, 0x8000, 0x9, 0xee00, r3, 0x200}}}, 0x90) D0620 03:40:24.831546 949939 task_exit.go:204] [ 48522: 48526] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:24.831712 949939 task_exit.go:204] [ 48522: 48526] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:24.831846 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:24.831964 949939 task_exit.go:204] [ 48522: 48522] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:24 executing program 1: r0 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000-00000000003,default_permissions,default_permissions,default_permissions,default_permissions,max_read=0x0000000000000001,seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b6673666c6f6f723d5d2c66756e633d46494c455f434845434b2c726f6f74636f6e746578743d73797361646d5f752c6f626a5f747970653d2e29242d27265b2c61756469742c66756e633d46494c455f4d4d41502c736d61636b6673726f6f743d5c26d029275c235b282c29292c00"], 0x1, 0x0, &(0x7f0000000380)="c84150383187cbf027c8a27826580f494cc22c49ed1fe92a4617d69ddbc3ea1f68f45b0a0aef1898b157ff6b35c6109f4a157c5658ebea4bcda5df2d27b22906765173860328637eaabbdcaf02be92d33315138d7ed4f276a05d1989d25cd6f86625c26e21eb35b7b30f4dae453c9b3a6c25") ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000400)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x40400, 0x8) r3 = accept$unix(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000500)) fcntl$setsig(r2, 0xa, 0x32) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000-00000000003,default_permissions,default_permissions,default_permissions,default_permissions,max_read=0x0000000000000001,seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b6673666c6f6f723d5d2c66756e633d46494c455f434845434b2c726f6f74636f6e746578743d73797361646d5f752c6f626a5f747970653d2e29242d27265b2c61756469742c66756e633d46494c455f4d4d41502c736d61636b6673726f6f743d5c26d029275c235b282c29292c00"], 0x1, 0x0, &(0x7f0000000380)="c84150383187cbf027c8a27826580f494cc22c49ed1fe92a4617d69ddbc3ea1f68f45b0a0aef1898b157ff6b35c6109f4a157c5658ebea4bcda5df2d27b22906765173860328637eaabbdcaf02be92d33315138d7ed4f276a05d1989d25cd6f86625c26e21eb35b7b30f4dae453c9b3a6c25") (async) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000400)) (async) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) open(&(0x7f00000000c0)='./bus\x00', 0x40400, 0x8) (async) accept$unix(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) (async) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000500)) (async) fcntl$setsig(r2, 0xa, 0x32) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r1, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) D0620 03:40:24.913713 949939 usertrap_amd64.go:212] [ 48520: 48520] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:24.913826 949939 usertrap_amd64.go:122] [ 48520: 48520] Allocate a new trap: 0xc009c863f0 43 D0620 03:40:24.913922 949939 usertrap_amd64.go:225] [ 48520: 48520] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:25.189106 949939 usertrap_amd64.go:212] [ 48520: 48520] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:25.189224 949939 usertrap_amd64.go:122] [ 48520: 48520] Allocate a new trap: 0xc009c863f0 44 D0620 03:40:25.189339 949939 usertrap_amd64.go:225] [ 48520: 48520] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:25.250968 949939 task_exit.go:204] [ 48520: 48520] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.251221 949939 task_signals.go:204] [ 48520: 48523] Signal 48520, PID: 48523, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.251361 949939 task_exit.go:204] [ 48520: 48523] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.251473 949939 task_signals.go:204] [ 48520: 48525] Signal 48520, PID: 48525, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.251596 949939 task_signals.go:204] [ 48520: 48528] Signal 48520, PID: 48528, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.251689 949939 task_exit.go:204] [ 48520: 48525] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.251915 949939 task_exit.go:204] [ 48520: 48525] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.251983 949939 task_exit.go:204] [ 48520: 48525] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.252096 949939 task_exit.go:204] [ 48520: 48520] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.252252 949939 task_exit.go:204] [ 48520: 48523] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.252327 949939 task_exit.go:204] [ 48520: 48523] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.252534 949939 task_exit.go:204] [ 48520: 48528] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.258542 949939 task_exit.go:204] [ 48520: 48528] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.258756 949939 task_exit.go:204] [ 48520: 48528] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.258941 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:25.259286 949939 task_exit.go:204] [ 48520: 48520] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:25 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0x127}, 0x4) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:25.270958 949939 usertrap_amd64.go:212] [ 48529: 48529] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:25.271131 949939 usertrap_amd64.go:122] [ 48529: 48529] Allocate a new trap: 0xc009a00420 40 D0620 03:40:25.271804 949939 usertrap_amd64.go:225] [ 48529: 48529] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:25.277816 949939 usertrap_amd64.go:212] [ 48529: 48529] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:25.277967 949939 usertrap_amd64.go:122] [ 48529: 48529] Allocate a new trap: 0xc009a00420 41 D0620 03:40:25.278067 949939 usertrap_amd64.go:225] [ 48529: 48529] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:25.287449 949939 usertrap_amd64.go:212] [ 48531: 48531] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:25.287592 949939 usertrap_amd64.go:122] [ 48531: 48531] Allocate a new trap: 0xc009c86600 40 D0620 03:40:25.288140 949939 usertrap_amd64.go:225] [ 48531: 48531] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:25.289197 949939 usertrap_amd64.go:212] [ 48530: 48530] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:25.289333 949939 usertrap_amd64.go:122] [ 48530: 48530] Allocate a new trap: 0xc009c865d0 40 D0620 03:40:25.289934 949939 usertrap_amd64.go:225] [ 48530: 48530] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:25.290934 949939 usertrap_amd64.go:212] [ 48531: 48531] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:25.291086 949939 usertrap_amd64.go:122] [ 48531: 48531] Allocate a new trap: 0xc009c86600 41 D0620 03:40:25.291181 949939 usertrap_amd64.go:225] [ 48531: 48531] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:25.293543 949939 usertrap_amd64.go:212] [ 48530: 48530] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:25.293602 949939 usertrap_amd64.go:122] [ 48530: 48530] Allocate a new trap: 0xc009c865d0 41 D0620 03:40:25.293706 949939 usertrap_amd64.go:225] [ 48530: 48530] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:25.293754 949939 usertrap_amd64.go:212] [ 48529: 48529] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:25.293803 949939 usertrap_amd64.go:122] [ 48529: 48529] Allocate a new trap: 0xc009a00420 42 D0620 03:40:25.293894 949939 usertrap_amd64.go:225] [ 48529: 48529] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:25.301986 949939 usertrap_amd64.go:212] [ 48532: 48532] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:25.302236 949939 usertrap_amd64.go:122] [ 48532: 48532] Allocate a new trap: 0xc009c86630 40 D0620 03:40:25.303040 949939 usertrap_amd64.go:225] [ 48532: 48532] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:25.306445 949939 usertrap_amd64.go:212] [ 48532: 48532] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:25.306577 949939 usertrap_amd64.go:122] [ 48532: 48532] Allocate a new trap: 0xc009c86630 41 D0620 03:40:25.306662 949939 usertrap_amd64.go:225] [ 48532: 48532] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:25.309200 949939 usertrap_amd64.go:212] [ 48531: 48531] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:25.309369 949939 usertrap_amd64.go:122] [ 48531: 48531] Allocate a new trap: 0xc009c86600 42 D0620 03:40:25.309517 949939 usertrap_amd64.go:225] [ 48531: 48531] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:25.314252 949939 usertrap_amd64.go:212] [ 48530: 48530] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:25.314363 949939 usertrap_amd64.go:122] [ 48530: 48530] Allocate a new trap: 0xc009c865d0 42 D0620 03:40:25.314487 949939 usertrap_amd64.go:225] [ 48530: 48530] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:25.325884 949939 usertrap_amd64.go:212] [ 48531: 48531] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:25.326011 949939 usertrap_amd64.go:122] [ 48531: 48531] Allocate a new trap: 0xc009c86600 43 D0620 03:40:25.326122 949939 usertrap_amd64.go:225] [ 48531: 48531] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:25.391573 949939 usertrap_amd64.go:212] [ 48531: 48531] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:25.391961 949939 usertrap_amd64.go:122] [ 48531: 48531] Allocate a new trap: 0xc009c86600 44 D0620 03:40:25.392315 949939 usertrap_amd64.go:225] [ 48531: 48531] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:25.393913 949939 usertrap_amd64.go:212] [ 48529: 48529] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:25.394031 949939 usertrap_amd64.go:122] [ 48529: 48529] Allocate a new trap: 0xc009a00420 43 D0620 03:40:25.394092 949939 usertrap_amd64.go:225] [ 48529: 48529] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:25.397211 949939 usertrap_amd64.go:212] [ 48532: 48532] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:25.397255 949939 task_exit.go:204] [ 48531: 48531] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.397316 949939 usertrap_amd64.go:122] [ 48532: 48532] Allocate a new trap: 0xc009c86630 42 D0620 03:40:25.397420 949939 usertrap_amd64.go:225] [ 48532: 48532] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:25.397488 949939 task_exit.go:204] [ 48531: 48531] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.397662 949939 task_signals.go:204] [ 48531: 48541] Signal 48531, PID: 48541, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.397762 949939 task_exit.go:204] [ 48531: 48541] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.397934 949939 task_signals.go:204] [ 48531: 48537] Signal 48531, PID: 48537, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.398016 949939 task_exit.go:204] [ 48531: 48537] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.398222 949939 task_signals.go:204] [ 48531: 48538] Signal 48531, PID: 48538, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.398317 949939 task_exit.go:204] [ 48531: 48537] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.398351 949939 task_exit.go:204] [ 48531: 48537] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.398472 949939 task_exit.go:204] [ 48531: 48541] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.398524 949939 task_exit.go:204] [ 48531: 48541] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.398630 949939 task_exit.go:204] [ 48531: 48538] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.398831 949939 task_exit.go:204] [ 48531: 48538] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.398891 949939 task_exit.go:204] [ 48531: 48538] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.399637 949939 task_signals.go:204] [ 48531: 48539] Signal 48531, PID: 48539, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.399760 949939 task_signals.go:204] [ 48531: 48535] Signal 48531, PID: 48535, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.399853 949939 task_exit.go:204] [ 48531: 48539] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.400163 949939 task_exit.go:204] [ 48531: 48539] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.400235 949939 task_exit.go:204] [ 48531: 48539] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.400379 949939 task_exit.go:204] [ 48531: 48535] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.406612 949939 task_exit.go:204] [ 48531: 48535] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.406679 949939 task_exit.go:204] [ 48531: 48535] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.406758 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:25.407019 949939 task_exit.go:204] [ 48531: 48531] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:25 executing program 1: syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000-00000000003,default_permissions,default_permissions,default_permissions,default_permissions,max_read=0x0000000000000001,seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b6673666c6f6f723d5d2c66756e633d46494c455f434845434b2c726f6f74636f6e746578743d73797361646d5f752c6f626a5f747970653d2e29242d27265b2c61756469742c66756e633d46494c455f4d4d41502c736d61636b6673726f6f743d5c26d029275c235b282c29292c00"], 0x1, 0x0, &(0x7f0000000380)="c84150383187cbf027c8a27826580f494cc22c49ed1fe92a4617d69ddbc3ea1f68f45b0a0aef1898b157ff6b35c6109f4a157c5658ebea4bcda5df2d27b22906765173860328637eaabbdcaf02be92d33315138d7ed4f276a05d1989d25cd6f86625c26e21eb35b7b30f4dae453c9b3a6c25") (async) r0 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000-00000000003,default_permissions,default_permissions,default_permissions,default_permissions,max_read=0x0000000000000001,seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b6673666c6f6f723d5d2c66756e633d46494c455f434845434b2c726f6f74636f6e746578743d73797361646d5f752c6f626a5f747970653d2e29242d27265b2c61756469742c66756e633d46494c455f4d4d41502c736d61636b6673726f6f743d5c26d029275c235b282c29292c00"], 0x1, 0x0, &(0x7f0000000380)="c84150383187cbf027c8a27826580f494cc22c49ed1fe92a4617d69ddbc3ea1f68f45b0a0aef1898b157ff6b35c6109f4a157c5658ebea4bcda5df2d27b22906765173860328637eaabbdcaf02be92d33315138d7ed4f276a05d1989d25cd6f86625c26e21eb35b7b30f4dae453c9b3a6c25") ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000400)) (async) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000400)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x40400, 0x8) r3 = accept$unix(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000500)) fcntl$setsig(r2, 0xa, 0x32) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r1, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:25.412278 949939 usertrap_amd64.go:212] [ 48530: 48530] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:25.412356 949939 usertrap_amd64.go:122] [ 48530: 48530] Allocate a new trap: 0xc009c865d0 43 D0620 03:40:25.412435 949939 usertrap_amd64.go:225] [ 48530: 48530] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:25.533224 949939 usertrap_amd64.go:212] [ 48532: 48532] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:25.533361 949939 usertrap_amd64.go:122] [ 48532: 48532] Allocate a new trap: 0xc009c86630 43 D0620 03:40:25.533460 949939 usertrap_amd64.go:225] [ 48532: 48532] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:25.730075 949939 usertrap_amd64.go:212] [ 48530: 48530] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:25.730213 949939 usertrap_amd64.go:122] [ 48530: 48530] Allocate a new trap: 0xc009c865d0 44 D0620 03:40:25.730353 949939 usertrap_amd64.go:225] [ 48530: 48530] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:25.730818 949939 usertrap_amd64.go:212] [ 48532: 48532] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:25.730904 949939 usertrap_amd64.go:122] [ 48532: 48532] Allocate a new trap: 0xc009c86630 44 D0620 03:40:25.730968 949939 usertrap_amd64.go:225] [ 48532: 48532] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:25.738425 949939 task_exit.go:204] [ 48532: 48532] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.738694 949939 task_signals.go:204] [ 48532: 48546] Signal 48532, PID: 48546, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.738807 949939 task_signals.go:204] [ 48532: 48548] Signal 48532, PID: 48548, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.738825 949939 task_signals.go:204] [ 48532: 48544] Signal 48532, PID: 48544, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.738961 949939 task_signals.go:204] [ 48532: 48547] Signal 48532, PID: 48547, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.738982 949939 task_exit.go:204] [ 48532: 48532] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.739182 949939 task_exit.go:204] [ 48532: 48546] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.739295 949939 task_exit.go:204] [ 48532: 48548] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.739464 949939 task_exit.go:204] [ 48532: 48544] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.739688 949939 task_exit.go:204] [ 48532: 48544] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.739777 949939 task_exit.go:204] [ 48532: 48544] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.739931 949939 task_signals.go:204] [ 48530: 48536] Signal 48530, PID: 48536, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.739935 949939 task_signals.go:204] [ 48530: 48542] Signal 48530, PID: 48542, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.740021 949939 task_exit.go:204] [ 48532: 48548] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.739991 949939 task_signals.go:204] [ 48530: 48545] Signal 48530, PID: 48545, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.740066 949939 task_exit.go:204] [ 48532: 48548] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.740208 949939 task_signals.go:204] [ 48530: 48540] Signal 48530, PID: 48540, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.740302 949939 task_exit.go:204] [ 48530: 48530] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.740526 949939 task_exit.go:204] [ 48530: 48530] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.740646 949939 task_exit.go:204] [ 48532: 48547] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.740971 949939 task_exit.go:204] [ 48532: 48547] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.741032 949939 task_exit.go:204] [ 48532: 48547] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.741167 949939 task_exit.go:204] [ 48530: 48536] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.741402 949939 task_exit.go:204] [ 48530: 48542] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.741614 949939 task_exit.go:204] [ 48530: 48545] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.741718 949939 task_exit.go:204] [ 48530: 48540] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.742102 949939 task_exit.go:204] [ 48530: 48536] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.742166 949939 task_exit.go:204] [ 48530: 48536] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.742460 949939 task_exit.go:204] [ 48530: 48542] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.742540 949939 task_exit.go:204] [ 48530: 48542] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.743064 949939 task_exit.go:204] [ 48530: 48540] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.743137 949939 task_exit.go:204] [ 48530: 48540] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.746486 949939 task_exit.go:204] [ 48532: 48546] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.746547 949939 task_exit.go:204] [ 48532: 48546] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.746838 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:25.747687 949939 task_exit.go:204] [ 48532: 48532] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:25 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./file0/file1\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x500, 0x95}, {0x2, 0x800}]}, 0x14, 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:25.757861 949939 task_exit.go:204] [ 48530: 48545] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.757940 949939 task_exit.go:204] [ 48530: 48545] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.758025 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:25.759431 949939 task_exit.go:204] [ 48530: 48530] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) getegid() (async) r3 = getegid() write$FUSE_ENTRY(r1, &(0x7f0000002180)={0x90, 0xffffffffffffffda, r2, {0x4, 0x1, 0x3f, 0x100000000, 0x9, 0x80000001, {0x0, 0x8, 0x80, 0x3, 0x2, 0x7fffffffffffffff, 0x10000, 0x9, 0xfa51, 0x8000, 0x9, 0xee00, r3, 0x200}}}, 0x90) (async) write$FUSE_ENTRY(r1, &(0x7f0000002180)={0x90, 0xffffffffffffffda, r2, {0x4, 0x1, 0x3f, 0x100000000, 0x9, 0x80000001, {0x0, 0x8, 0x80, 0x3, 0x2, 0x7fffffffffffffff, 0x10000, 0x9, 0xfa51, 0x8000, 0x9, 0xee00, r3, 0x200}}}, 0x90) D0620 03:40:25.766056 949939 usertrap_amd64.go:212] [ 48549: 48549] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:25.766171 949939 usertrap_amd64.go:122] [ 48549: 48549] Allocate a new trap: 0xc01f00e6f0 40 D0620 03:40:25.766811 949939 usertrap_amd64.go:225] [ 48549: 48549] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:25.809379 949939 task_signals.go:470] [ 7: 26] Notified of signal 23 D0620 03:40:25.809701 949939 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler D0620 03:40:25.841126 949939 usertrap_amd64.go:212] [ 48549: 48549] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:25.841248 949939 usertrap_amd64.go:122] [ 48549: 48549] Allocate a new trap: 0xc01f00e6f0 41 D0620 03:40:25.841339 949939 usertrap_amd64.go:225] [ 48549: 48549] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:25.841813 949939 usertrap_amd64.go:212] [ 48550: 48550] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:25.841897 949939 usertrap_amd64.go:122] [ 48550: 48550] Allocate a new trap: 0xc006c985d0 40 D0620 03:40:25.844477 949939 usertrap_amd64.go:225] [ 48550: 48550] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:25.847988 949939 usertrap_amd64.go:212] [ 48550: 48550] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:25.848059 949939 usertrap_amd64.go:122] [ 48550: 48550] Allocate a new trap: 0xc006c985d0 41 D0620 03:40:25.848161 949939 usertrap_amd64.go:225] [ 48550: 48550] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:25.852232 949939 usertrap_amd64.go:212] [ 48551: 48551] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:25.852353 949939 usertrap_amd64.go:122] [ 48551: 48551] Allocate a new trap: 0xc006c98600 40 D0620 03:40:25.852897 949939 usertrap_amd64.go:225] [ 48551: 48551] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:25.856920 949939 usertrap_amd64.go:212] [ 48551: 48551] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:25.857145 949939 usertrap_amd64.go:122] [ 48551: 48551] Allocate a new trap: 0xc006c98600 41 D0620 03:40:25.857264 949939 usertrap_amd64.go:225] [ 48551: 48551] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:25.880220 949939 usertrap_amd64.go:212] [ 48549: 48549] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:25.880317 949939 usertrap_amd64.go:122] [ 48549: 48549] Allocate a new trap: 0xc01f00e6f0 42 D0620 03:40:25.880414 949939 usertrap_amd64.go:225] [ 48549: 48549] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:25.882478 949939 usertrap_amd64.go:212] [ 48550: 48550] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:25.882677 949939 usertrap_amd64.go:122] [ 48550: 48550] Allocate a new trap: 0xc006c985d0 42 D0620 03:40:25.882845 949939 usertrap_amd64.go:225] [ 48550: 48550] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:25.898839 949939 usertrap_amd64.go:212] [ 48549: 48549] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:25.898981 949939 usertrap_amd64.go:122] [ 48549: 48549] Allocate a new trap: 0xc01f00e6f0 43 D0620 03:40:25.899085 949939 usertrap_amd64.go:225] [ 48549: 48549] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:25.903818 949939 usertrap_amd64.go:212] [ 48551: 48551] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:25.903898 949939 usertrap_amd64.go:122] [ 48551: 48551] Allocate a new trap: 0xc006c98600 42 D0620 03:40:25.903979 949939 usertrap_amd64.go:225] [ 48551: 48551] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:25.905164 949939 task_exit.go:204] [ 48549: 48549] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.905451 949939 task_exit.go:204] [ 48549: 48549] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.905647 949939 task_signals.go:204] [ 48549: 48553] Signal 48549, PID: 48553, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.905897 949939 task_signals.go:204] [ 48549: 48554] Signal 48549, PID: 48554, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:25.906578 949939 task_exit.go:204] [ 48549: 48553] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.906959 949939 task_exit.go:204] [ 48549: 48554] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:25.907311 949939 task_exit.go:204] [ 48549: 48553] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.907397 949939 task_exit.go:204] [ 48549: 48553] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:25.915142 949939 task_exit.go:204] [ 48549: 48554] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:25.915678 949939 task_exit.go:204] [ 48549: 48554] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.328512 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:26.328883 949939 task_exit.go:204] [ 48549: 48549] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.329355 949939 usertrap_amd64.go:212] [ 48529: 48529] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:26.329436 949939 usertrap_amd64.go:122] [ 48529: 48529] Allocate a new trap: 0xc009a00420 44 D0620 03:40:26.329549 949939 usertrap_amd64.go:225] [ 48529: 48529] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) 03:40:26 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0xc, &(0x7f0000000100)={0x0, 0xfffeffffffffffff}) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)={0x80, 0x3ff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:26.332861 949939 usertrap_amd64.go:212] [ 48550: 48550] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:26.333011 949939 usertrap_amd64.go:122] [ 48550: 48550] Allocate a new trap: 0xc006c985d0 43 D0620 03:40:26.333110 949939 usertrap_amd64.go:225] [ 48550: 48550] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:26.338078 949939 task_exit.go:204] [ 48529: 48529] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.338324 949939 task_signals.go:204] [ 48529: 48533] Signal 48529, PID: 48533, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.338482 949939 task_exit.go:204] [ 48529: 48529] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.338710 949939 task_exit.go:204] [ 48529: 48533] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.339197 949939 task_signals.go:204] [ 48529: 48534] Signal 48529, PID: 48534, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.339490 949939 task_signals.go:204] [ 48529: 48543] Signal 48529, PID: 48543, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.339713 949939 task_exit.go:204] [ 48529: 48533] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.339770 949939 task_exit.go:204] [ 48529: 48533] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.339910 949939 task_exit.go:204] [ 48529: 48534] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.340215 949939 task_exit.go:204] [ 48529: 48534] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.340277 949939 task_exit.go:204] [ 48529: 48534] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.340429 949939 task_exit.go:204] [ 48529: 48543] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.340656 949939 task_exit.go:204] [ 48550: 48550] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.340909 949939 task_exit.go:204] [ 48550: 48550] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.340920 949939 task_signals.go:204] [ 48550: 48556] Signal 48550, PID: 48556, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.340919 949939 task_signals.go:204] [ 48550: 48552] Signal 48550, PID: 48552, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.341165 949939 task_exit.go:204] [ 48550: 48556] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.341419 949939 task_exit.go:204] [ 48550: 48556] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.341481 949939 task_exit.go:204] [ 48550: 48556] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.341642 949939 task_exit.go:204] [ 48550: 48552] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.348372 949939 task_exit.go:204] [ 48550: 48552] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.348472 949939 task_exit.go:204] [ 48550: 48552] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.348590 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:26.348817 949939 task_exit.go:204] [ 48529: 48543] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.348916 949939 task_exit.go:204] [ 48529: 48543] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.349047 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:26.349189 949939 task_exit.go:204] [ 48529: 48529] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.349331 949939 task_exit.go:204] [ 48550: 48550] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x10000, {{0xa, 0x4e24, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}}, 0x88) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5450, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) (async) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) 03:40:26 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./file0/file1\x00', 0x0) (async) setxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x500, 0x95}, {0x2, 0x800}]}, 0x14, 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:26.499095 949939 usertrap_amd64.go:212] [ 48551: 48551] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:26.499210 949939 usertrap_amd64.go:122] [ 48551: 48551] Allocate a new trap: 0xc006c98600 43 D0620 03:40:26.499268 949939 usertrap_amd64.go:225] [ 48551: 48551] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:26.711479 949939 usertrap_amd64.go:212] [ 48551: 48551] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:26.711552 949939 usertrap_amd64.go:122] [ 48551: 48551] Allocate a new trap: 0xc006c98600 44 D0620 03:40:26.711637 949939 usertrap_amd64.go:225] [ 48551: 48551] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:26.716022 949939 task_exit.go:204] [ 48551: 48551] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.716264 949939 task_exit.go:204] [ 48551: 48551] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.716591 949939 task_signals.go:204] [ 48551: 48560] Signal 48551, PID: 48560, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.716732 949939 task_exit.go:204] [ 48551: 48560] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.716719 949939 task_signals.go:204] [ 48551: 48561] Signal 48551, PID: 48561, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.716927 949939 task_exit.go:204] [ 48551: 48561] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.717266 949939 task_exit.go:204] [ 48551: 48560] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.717356 949939 task_exit.go:204] [ 48551: 48560] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.717530 949939 task_exit.go:204] [ 48551: 48561] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.717602 949939 task_exit.go:204] [ 48551: 48561] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.747909 949939 task_signals.go:204] [ 48551: 48557] Signal 48551, PID: 48557, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.748070 949939 task_exit.go:204] [ 48551: 48557] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.748295 949939 task_exit.go:204] [ 48551: 48557] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.748370 949939 task_exit.go:204] [ 48551: 48557] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.748679 949939 task_signals.go:204] [ 48551: 48558] Signal 48551, PID: 48558, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.748797 949939 task_exit.go:204] [ 48551: 48558] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.749119 949939 task_signals.go:204] [ 48551: 48555] Signal 48551, PID: 48555, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.749207 949939 task_exit.go:204] [ 48551: 48555] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.749410 949939 task_exit.go:204] [ 48551: 48555] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.749466 949939 task_exit.go:204] [ 48551: 48555] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.749721 949939 task_signals.go:204] [ 48551: 48559] Signal 48551, PID: 48559, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.749968 949939 task_exit.go:204] [ 48551: 48559] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.750275 949939 task_exit.go:204] [ 48551: 48558] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.750343 949939 task_exit.go:204] [ 48551: 48558] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.759111 949939 task_exit.go:204] [ 48551: 48559] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.759325 949939 task_exit.go:204] [ 48551: 48559] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.759522 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:26.760582 949939 task_exit.go:204] [ 48551: 48551] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:26 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5452, &(0x7f00000041c0)={{}, "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"}) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:26.854138 949939 usertrap_amd64.go:212] [ 48562: 48562] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:26.854371 949939 usertrap_amd64.go:122] [ 48562: 48562] Allocate a new trap: 0xc006c98690 40 D0620 03:40:26.854989 949939 usertrap_amd64.go:225] [ 48562: 48562] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:26.858681 949939 usertrap_amd64.go:212] [ 48562: 48562] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:26.858997 949939 usertrap_amd64.go:122] [ 48562: 48562] Allocate a new trap: 0xc006c98690 41 D0620 03:40:26.859182 949939 usertrap_amd64.go:225] [ 48562: 48562] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:26.866326 949939 usertrap_amd64.go:212] [ 48563: 48563] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:26.866537 949939 usertrap_amd64.go:122] [ 48563: 48563] Allocate a new trap: 0xc0059c00c0 40 D0620 03:40:26.867286 949939 usertrap_amd64.go:225] [ 48563: 48563] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:26.871714 949939 usertrap_amd64.go:212] [ 48564: 48564] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:26.871864 949939 usertrap_amd64.go:122] [ 48564: 48564] Allocate a new trap: 0xc01f00e960 40 D0620 03:40:26.872331 949939 usertrap_amd64.go:212] [ 48563: 48563] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:26.872433 949939 usertrap_amd64.go:122] [ 48563: 48563] Allocate a new trap: 0xc0059c00c0 41 D0620 03:40:26.872515 949939 usertrap_amd64.go:225] [ 48563: 48563] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:26.872719 949939 usertrap_amd64.go:225] [ 48564: 48564] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:26.875819 949939 usertrap_amd64.go:212] [ 48564: 48564] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:26.875937 949939 usertrap_amd64.go:122] [ 48564: 48564] Allocate a new trap: 0xc01f00e960 41 D0620 03:40:26.876032 949939 usertrap_amd64.go:225] [ 48564: 48564] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:26.882256 949939 usertrap_amd64.go:212] [ 48562: 48562] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:26.882353 949939 usertrap_amd64.go:122] [ 48562: 48562] Allocate a new trap: 0xc006c98690 42 D0620 03:40:26.882457 949939 usertrap_amd64.go:225] [ 48562: 48562] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:26.887848 949939 usertrap_amd64.go:212] [ 48565: 48565] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:26.887996 949939 usertrap_amd64.go:122] [ 48565: 48565] Allocate a new trap: 0xc002380ab0 40 D0620 03:40:26.889368 949939 usertrap_amd64.go:225] [ 48565: 48565] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:26.890347 949939 task_signals.go:470] [ 48562: 48566] Notified of signal 25 D0620 03:40:26.890502 949939 task_signals.go:204] [ 48562: 48566] Signal 48562, PID: 48566, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:26.890636 949939 task_exit.go:204] [ 48562: 48566] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.891030 949939 task_signals.go:204] [ 48562: 48562] Signal 48562, PID: 48562, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:26.891248 949939 task_exit.go:204] [ 48562: 48566] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.891330 949939 task_exit.go:204] [ 48562: 48566] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:26.891469 949939 task_exit.go:204] [ 48562: 48562] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:26.892503 949939 usertrap_amd64.go:212] [ 48565: 48565] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:26.892578 949939 usertrap_amd64.go:122] [ 48565: 48565] Allocate a new trap: 0xc002380ab0 41 D0620 03:40:26.892657 949939 usertrap_amd64.go:225] [ 48565: 48565] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:26.895264 949939 usertrap_amd64.go:212] [ 48564: 48564] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:26.895449 949939 usertrap_amd64.go:122] [ 48564: 48564] Allocate a new trap: 0xc01f00e960 42 D0620 03:40:26.895534 949939 usertrap_amd64.go:225] [ 48564: 48564] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:26.895681 949939 usertrap_amd64.go:212] [ 48563: 48563] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:26.895803 949939 usertrap_amd64.go:122] [ 48563: 48563] Allocate a new trap: 0xc0059c00c0 42 D0620 03:40:26.895897 949939 usertrap_amd64.go:225] [ 48563: 48563] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:26.897223 949939 task_exit.go:204] [ 48562: 48562] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:26.897313 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:26.897804 949939 task_exit.go:204] [ 48562: 48562] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:26 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0xc, &(0x7f0000000100)={0x0, 0xfffeffffffffffff}) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)={0x80, 0x3ff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:26.906803 949939 usertrap_amd64.go:212] [ 48564: 48564] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:26.906907 949939 usertrap_amd64.go:122] [ 48564: 48564] Allocate a new trap: 0xc01f00e960 43 D0620 03:40:26.907003 949939 usertrap_amd64.go:225] [ 48564: 48564] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:26.969029 949939 usertrap_amd64.go:212] [ 48563: 48563] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:26.969153 949939 usertrap_amd64.go:122] [ 48563: 48563] Allocate a new trap: 0xc0059c00c0 43 D0620 03:40:26.969235 949939 usertrap_amd64.go:225] [ 48563: 48563] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:26.973081 949939 usertrap_amd64.go:212] [ 48565: 48565] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:26.973198 949939 usertrap_amd64.go:122] [ 48565: 48565] Allocate a new trap: 0xc002380ab0 42 D0620 03:40:26.973316 949939 usertrap_amd64.go:225] [ 48565: 48565] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:27.353708 949939 usertrap_amd64.go:212] [ 48564: 48564] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:27.353913 949939 usertrap_amd64.go:122] [ 48564: 48564] Allocate a new trap: 0xc01f00e960 44 D0620 03:40:27.354006 949939 usertrap_amd64.go:225] [ 48564: 48564] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:27.359073 949939 usertrap_amd64.go:212] [ 48572: 48572] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:27.359270 949939 usertrap_amd64.go:122] [ 48572: 48572] Allocate a new trap: 0xc0059c01e0 40 D0620 03:40:27.360070 949939 usertrap_amd64.go:225] [ 48572: 48572] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:27.368308 949939 task_exit.go:204] [ 48564: 48564] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.368599 949939 task_signals.go:204] [ 48564: 48571] Signal 48564, PID: 48571, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.368650 949939 task_exit.go:204] [ 48564: 48564] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.368872 949939 task_signals.go:204] [ 48564: 48569] Signal 48564, PID: 48569, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.368912 949939 task_signals.go:204] [ 48564: 48567] Signal 48564, PID: 48567, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.369042 949939 task_exit.go:204] [ 48564: 48569] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.369239 949939 task_exit.go:204] [ 48564: 48567] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.369607 949939 task_exit.go:204] [ 48564: 48567] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.369689 949939 task_exit.go:204] [ 48564: 48567] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.369887 949939 task_exit.go:204] [ 48564: 48571] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.370286 949939 task_exit.go:204] [ 48564: 48571] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.370335 949939 task_exit.go:204] [ 48564: 48571] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.375930 949939 task_exit.go:204] [ 48564: 48569] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.376034 949939 task_exit.go:204] [ 48564: 48569] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.376200 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:27.376351 949939 task_exit.go:204] [ 48564: 48564] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:27 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./file0/file1\x00', 0x0) setxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x500, 0x95}, {0x2, 0x800}]}, 0x14, 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./file0/file1\x00', 0x0) (async) setxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x500, 0x95}, {0x2, 0x800}]}, 0x14, 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) D0620 03:40:27.383193 949939 usertrap_amd64.go:212] [ 48572: 48572] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:27.383283 949939 usertrap_amd64.go:122] [ 48572: 48572] Allocate a new trap: 0xc0059c01e0 41 D0620 03:40:27.383353 949939 usertrap_amd64.go:225] [ 48572: 48572] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:27.462932 949939 usertrap_amd64.go:212] [ 48565: 48565] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:27.463034 949939 usertrap_amd64.go:122] [ 48565: 48565] Allocate a new trap: 0xc002380ab0 43 D0620 03:40:27.463139 949939 usertrap_amd64.go:225] [ 48565: 48565] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:27.758044 949939 usertrap_amd64.go:212] [ 48563: 48563] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:27.758126 949939 usertrap_amd64.go:122] [ 48563: 48563] Allocate a new trap: 0xc0059c00c0 44 D0620 03:40:27.758239 949939 usertrap_amd64.go:225] [ 48563: 48563] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:27.758421 949939 usertrap_amd64.go:212] [ 48565: 48565] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:27.758704 949939 usertrap_amd64.go:122] [ 48565: 48565] Allocate a new trap: 0xc002380ab0 44 D0620 03:40:27.758815 949939 usertrap_amd64.go:225] [ 48565: 48565] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:27.825897 949939 task_exit.go:204] [ 48563: 48563] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.826358 949939 task_exit.go:204] [ 48563: 48563] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.826542 949939 task_signals.go:204] [ 48563: 48568] Signal 48563, PID: 48568, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.826543 949939 task_signals.go:204] [ 48563: 48570] Signal 48563, PID: 48570, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.826696 949939 task_exit.go:204] [ 48563: 48568] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.826810 949939 task_exit.go:204] [ 48563: 48570] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.827097 949939 task_exit.go:204] [ 48563: 48570] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.827161 949939 task_exit.go:204] [ 48563: 48570] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.827468 949939 task_exit.go:204] [ 48565: 48565] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.827698 949939 task_signals.go:204] [ 48565: 48575] Signal 48565, PID: 48575, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.827663 949939 task_signals.go:204] [ 48565: 48573] Signal 48565, PID: 48573, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.827734 949939 task_signals.go:204] [ 48565: 48574] Signal 48565, PID: 48574, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.828385 949939 task_exit.go:204] [ 48565: 48565] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.828500 949939 task_exit.go:204] [ 48565: 48573] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.828655 949939 task_exit.go:204] [ 48565: 48573] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.828707 949939 task_exit.go:204] [ 48565: 48573] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.829064 949939 task_exit.go:204] [ 48565: 48575] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.829348 949939 task_exit.go:204] [ 48565: 48574] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.829606 949939 task_exit.go:204] [ 48565: 48575] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.829712 949939 task_exit.go:204] [ 48565: 48575] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.834141 949939 task_exit.go:204] [ 48563: 48568] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.834228 949939 task_exit.go:204] [ 48563: 48568] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.834267 949939 usertrap_amd64.go:212] [ 48572: 48572] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:27.834347 949939 usertrap_amd64.go:122] [ 48572: 48572] Allocate a new trap: 0xc0059c01e0 42 D0620 03:40:27.834432 949939 usertrap_amd64.go:225] [ 48572: 48572] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:27.834339 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:27.834735 949939 task_exit.go:204] [ 48563: 48563] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.835999 949939 task_exit.go:204] [ 48565: 48574] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.836182 949939 task_exit.go:204] [ 48565: 48574] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e1e, @private=0xa010102}, 0x10) r3 = accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x80800) accept$inet(r3, 0x0, &(0x7f00000000c0)) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:27.836362 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:27.836660 949939 task_exit.go:204] [ 48565: 48565] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.838308 949939 usertrap_amd64.go:212] [ 48576: 48576] Found the pattern at ip 55e1e03de720:sysno 109 03:40:27 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) ioctl$FIONCLEX(r2, 0x5450) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5452, &(0x7f00000041c0)={{}, "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"}) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:27.838570 949939 usertrap_amd64.go:122] [ 48576: 48576] Allocate a new trap: 0xc006c98780 40 D0620 03:40:27.839203 949939 usertrap_amd64.go:225] [ 48576: 48576] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:27.842557 949939 usertrap_amd64.go:212] [ 48576: 48576] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:27.842619 949939 usertrap_amd64.go:122] [ 48576: 48576] Allocate a new trap: 0xc006c98780 41 D0620 03:40:27.842693 949939 usertrap_amd64.go:225] [ 48576: 48576] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:27.842889 949939 task_signals.go:470] [ 48572: 48578] Notified of signal 25 D0620 03:40:27.843055 949939 task_signals.go:204] [ 48572: 48578] Signal 48572, PID: 48578, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:27.843204 949939 task_exit.go:204] [ 48572: 48578] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.843421 949939 task_exit.go:204] [ 48572: 48578] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.843435 949939 task_signals.go:204] [ 48572: 48572] Signal 48572, PID: 48572, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.843476 949939 task_exit.go:204] [ 48572: 48578] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.843719 949939 task_exit.go:204] [ 48572: 48572] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.843731 949939 task_signals.go:204] [ 48572: 48577] Signal 48572, PID: 48577, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.843938 949939 task_exit.go:204] [ 48572: 48572] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.844072 949939 task_exit.go:204] [ 48572: 48577] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.848641 949939 task_exit.go:204] [ 48572: 48577] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.848736 949939 task_exit.go:204] [ 48572: 48577] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.848831 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:27.848981 949939 task_exit.go:204] [ 48572: 48572] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:27 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0xc, &(0x7f0000000100)={0x0, 0xfffeffffffffffff}) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)={0x80, 0x3ff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0xc, &(0x7f0000000100)={0x0, 0xfffeffffffffffff}) (async) utime(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)={0x80, 0x3ff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) D0620 03:40:27.868493 949939 usertrap_amd64.go:212] [ 48579: 48579] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:27.868632 949939 usertrap_amd64.go:122] [ 48579: 48579] Allocate a new trap: 0xc006c987b0 40 D0620 03:40:27.869438 949939 usertrap_amd64.go:225] [ 48579: 48579] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:27.876851 949939 usertrap_amd64.go:212] [ 48579: 48579] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:27.877079 949939 usertrap_amd64.go:122] [ 48579: 48579] Allocate a new trap: 0xc006c987b0 41 D0620 03:40:27.877253 949939 usertrap_amd64.go:225] [ 48579: 48579] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:27.880587 949939 usertrap_amd64.go:212] [ 48581: 48581] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:27.880730 949939 usertrap_amd64.go:122] [ 48581: 48581] Allocate a new trap: 0xc003084720 40 D0620 03:40:27.881310 949939 usertrap_amd64.go:225] [ 48581: 48581] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:27.882576 949939 usertrap_amd64.go:212] [ 48580: 48580] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:27.882689 949939 usertrap_amd64.go:122] [ 48580: 48580] Allocate a new trap: 0xc009c86a80 40 D0620 03:40:27.883343 949939 usertrap_amd64.go:225] [ 48580: 48580] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:27.884462 949939 usertrap_amd64.go:212] [ 48581: 48581] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:27.884533 949939 usertrap_amd64.go:122] [ 48581: 48581] Allocate a new trap: 0xc003084720 41 D0620 03:40:27.884697 949939 usertrap_amd64.go:225] [ 48581: 48581] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:27.887290 949939 usertrap_amd64.go:212] [ 48580: 48580] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:27.887396 949939 usertrap_amd64.go:122] [ 48580: 48580] Allocate a new trap: 0xc009c86a80 41 D0620 03:40:27.887501 949939 usertrap_amd64.go:225] [ 48580: 48580] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:27.890683 949939 usertrap_amd64.go:212] [ 48576: 48576] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:27.890864 949939 usertrap_amd64.go:122] [ 48576: 48576] Allocate a new trap: 0xc006c98780 42 D0620 03:40:27.890965 949939 usertrap_amd64.go:225] [ 48576: 48576] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:27.897952 949939 usertrap_amd64.go:212] [ 48579: 48579] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:27.898054 949939 usertrap_amd64.go:122] [ 48579: 48579] Allocate a new trap: 0xc006c987b0 42 D0620 03:40:27.898126 949939 usertrap_amd64.go:225] [ 48579: 48579] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:27.903549 949939 usertrap_amd64.go:212] [ 48581: 48581] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:27.903655 949939 usertrap_amd64.go:122] [ 48581: 48581] Allocate a new trap: 0xc003084720 42 D0620 03:40:27.903752 949939 usertrap_amd64.go:225] [ 48581: 48581] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:27.907770 949939 usertrap_amd64.go:212] [ 48580: 48580] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:27.907879 949939 usertrap_amd64.go:122] [ 48580: 48580] Allocate a new trap: 0xc009c86a80 42 D0620 03:40:27.907989 949939 usertrap_amd64.go:225] [ 48580: 48580] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:27.912995 949939 task_signals.go:470] [ 48581: 48584] Notified of signal 25 D0620 03:40:27.913163 949939 task_signals.go:204] [ 48581: 48584] Signal 48581, PID: 48584, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:27.913309 949939 task_exit.go:204] [ 48581: 48584] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.913479 949939 task_exit.go:204] [ 48581: 48584] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:27.913527 949939 task_exit.go:204] [ 48581: 48584] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:27.913678 949939 task_signals.go:204] [ 48581: 48581] Signal 48581, PID: 48581, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:27.913784 949939 task_exit.go:204] [ 48581: 48581] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:27.974788 949939 usertrap_amd64.go:212] [ 48579: 48579] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:27.974923 949939 usertrap_amd64.go:122] [ 48579: 48579] Allocate a new trap: 0xc006c987b0 43 D0620 03:40:27.975025 949939 usertrap_amd64.go:225] [ 48579: 48579] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:28.678385 949939 task_exit.go:204] [ 48581: 48581] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.678521 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:28.679760 949939 task_exit.go:204] [ 48581: 48581] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:28 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x4, 0x2) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:28.681207 949939 usertrap_amd64.go:212] [ 48576: 48576] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:28.681351 949939 usertrap_amd64.go:122] [ 48576: 48576] Allocate a new trap: 0xc006c98780 43 D0620 03:40:28.681442 949939 usertrap_amd64.go:225] [ 48576: 48576] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:28.683422 949939 usertrap_amd64.go:212] [ 48580: 48580] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:28.683505 949939 usertrap_amd64.go:122] [ 48580: 48580] Allocate a new trap: 0xc009c86a80 43 D0620 03:40:28.683667 949939 usertrap_amd64.go:225] [ 48580: 48580] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:28.691752 949939 task_exit.go:204] [ 48580: 48580] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.692012 949939 task_signals.go:204] [ 48580: 48585] Signal 48580, PID: 48585, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.692102 949939 task_exit.go:204] [ 48580: 48580] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.692300 949939 task_signals.go:204] [ 48580: 48588] Signal 48580, PID: 48588, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.692345 949939 task_signals.go:204] [ 48580: 48589] Signal 48580, PID: 48589, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.692414 949939 task_exit.go:204] [ 48580: 48588] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.692628 949939 task_exit.go:204] [ 48580: 48588] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.692670 949939 task_exit.go:204] [ 48580: 48588] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.692810 949939 task_exit.go:204] [ 48580: 48589] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.693037 949939 task_exit.go:204] [ 48580: 48585] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.693500 949939 task_exit.go:204] [ 48580: 48589] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.693576 949939 task_exit.go:204] [ 48580: 48589] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.699361 949939 task_exit.go:204] [ 48580: 48585] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.699493 949939 task_exit.go:204] [ 48580: 48585] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.699634 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:28.700841 949939 task_exit.go:204] [ 48580: 48580] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:28 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5452, &(0x7f00000041c0)={{}, "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"}) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:28.771907 949939 usertrap_amd64.go:212] [ 48592: 48592] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:28.772068 949939 usertrap_amd64.go:122] [ 48592: 48592] Allocate a new trap: 0xc0021b4510 40 D0620 03:40:28.772354 949939 usertrap_amd64.go:212] [ 48579: 48579] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:28.772534 949939 usertrap_amd64.go:122] [ 48579: 48579] Allocate a new trap: 0xc006c987b0 44 D0620 03:40:28.772793 949939 usertrap_amd64.go:225] [ 48579: 48579] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:28.772882 949939 usertrap_amd64.go:225] [ 48592: 48592] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:28.773587 949939 usertrap_amd64.go:212] [ 48576: 48576] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:28.773791 949939 usertrap_amd64.go:122] [ 48576: 48576] Allocate a new trap: 0xc006c98780 44 D0620 03:40:28.773894 949939 usertrap_amd64.go:225] [ 48576: 48576] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:28.777681 949939 usertrap_amd64.go:212] [ 48592: 48592] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:28.777785 949939 usertrap_amd64.go:122] [ 48592: 48592] Allocate a new trap: 0xc0021b4510 41 D0620 03:40:28.777881 949939 usertrap_amd64.go:225] [ 48592: 48592] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:28.784316 949939 task_exit.go:204] [ 48579: 48579] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.784729 949939 task_exit.go:204] [ 48579: 48579] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.785035 949939 task_signals.go:204] [ 48579: 48587] Signal 48579, PID: 48587, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.785227 949939 task_exit.go:204] [ 48579: 48587] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.785054 949939 task_signals.go:204] [ 48579: 48583] Signal 48579, PID: 48583, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.785374 949939 task_exit.go:204] [ 48579: 48583] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.786190 949939 task_exit.go:204] [ 48579: 48583] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.786257 949939 task_exit.go:204] [ 48579: 48583] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.787555 949939 task_exit.go:204] [ 48576: 48576] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.787801 949939 task_signals.go:204] [ 48576: 48590] Signal 48576, PID: 48590, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.787935 949939 task_signals.go:204] [ 48576: 48591] Signal 48576, PID: 48591, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.788091 949939 task_signals.go:204] [ 48576: 48586] Signal 48576, PID: 48586, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.788181 949939 task_signals.go:204] [ 48576: 48582] Signal 48576, PID: 48582, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:28.788245 949939 task_exit.go:204] [ 48576: 48576] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.788417 949939 task_exit.go:204] [ 48576: 48590] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.788554 949939 task_exit.go:204] [ 48576: 48591] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.788913 949939 task_exit.go:204] [ 48576: 48591] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.789056 949939 task_exit.go:204] [ 48576: 48591] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.789210 949939 task_exit.go:204] [ 48576: 48586] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.789454 949939 task_exit.go:204] [ 48576: 48586] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.789549 949939 task_exit.go:204] [ 48576: 48586] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.789715 949939 task_exit.go:204] [ 48576: 48582] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:28.790056 949939 task_exit.go:204] [ 48576: 48582] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.790135 949939 task_exit.go:204] [ 48576: 48582] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.794819 949939 usertrap_amd64.go:212] [ 48593: 48593] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:28.794963 949939 usertrap_amd64.go:122] [ 48593: 48593] Allocate a new trap: 0xc0093aed80 40 D0620 03:40:28.795220 949939 task_exit.go:204] [ 48576: 48590] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.795387 949939 task_exit.go:204] [ 48576: 48590] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.795512 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:28.796018 949939 usertrap_amd64.go:225] [ 48593: 48593] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:28.796180 949939 task_exit.go:204] [ 48576: 48576] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:28 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f00000000c0)='./file0/file1\x00') truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:28.801436 949939 usertrap_amd64.go:212] [ 48592: 48592] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:28.801538 949939 usertrap_amd64.go:122] [ 48592: 48592] Allocate a new trap: 0xc0021b4510 42 D0620 03:40:28.801646 949939 usertrap_amd64.go:225] [ 48592: 48592] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:28.802010 949939 task_exit.go:204] [ 48579: 48587] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:28.802117 949939 task_exit.go:204] [ 48579: 48587] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.802241 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:28.803107 949939 task_exit.go:204] [ 48579: 48579] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:28.806441 949939 usertrap_amd64.go:212] [ 48593: 48593] Found the pattern at ip 5588aa8a1bb0:sysno 266 03:40:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e1e, @private=0xa010102}, 0x10) r3 = accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x80800) accept$inet(r3, 0x0, &(0x7f00000000c0)) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) dup(r0) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x0) (async) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e1e, @private=0xa010102}, 0x10) (async) accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x80800) (async) accept$inet(r3, 0x0, &(0x7f00000000c0)) (async) accept4$inet(r1, 0x0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) (async) D0620 03:40:28.807265 949939 usertrap_amd64.go:122] [ 48593: 48593] Allocate a new trap: 0xc0093aed80 41 D0620 03:40:28.807413 949939 usertrap_amd64.go:225] [ 48593: 48593] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:28.840624 949939 usertrap_amd64.go:212] [ 48595: 48595] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:28.840755 949939 usertrap_amd64.go:122] [ 48595: 48595] Allocate a new trap: 0xc000d0a330 40 D0620 03:40:28.841408 949939 usertrap_amd64.go:225] [ 48595: 48595] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:28.844758 949939 usertrap_amd64.go:212] [ 48595: 48595] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:28.844886 949939 usertrap_amd64.go:122] [ 48595: 48595] Allocate a new trap: 0xc000d0a330 41 D0620 03:40:28.845090 949939 usertrap_amd64.go:225] [ 48595: 48595] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:28.848256 949939 usertrap_amd64.go:212] [ 48593: 48593] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:28.848524 949939 usertrap_amd64.go:212] [ 48596: 48596] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:28.848442 949939 usertrap_amd64.go:122] [ 48593: 48593] Allocate a new trap: 0xc0093aed80 42 D0620 03:40:28.848803 949939 usertrap_amd64.go:225] [ 48593: 48593] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:28.848679 949939 usertrap_amd64.go:122] [ 48596: 48596] Allocate a new trap: 0xc0093aee40 40 D0620 03:40:28.849797 949939 usertrap_amd64.go:225] [ 48596: 48596] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:28.854048 949939 usertrap_amd64.go:212] [ 48596: 48596] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:28.854151 949939 usertrap_amd64.go:122] [ 48596: 48596] Allocate a new trap: 0xc0093aee40 41 D0620 03:40:28.854237 949939 usertrap_amd64.go:225] [ 48596: 48596] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:29.287563 949939 usertrap_amd64.go:212] [ 48593: 48593] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:29.287670 949939 usertrap_amd64.go:122] [ 48593: 48593] Allocate a new trap: 0xc0093aed80 43 D0620 03:40:29.287751 949939 usertrap_amd64.go:225] [ 48593: 48593] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:29.291386 949939 usertrap_amd64.go:212] [ 48592: 48592] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:29.291537 949939 usertrap_amd64.go:122] [ 48592: 48592] Allocate a new trap: 0xc0021b4510 43 D0620 03:40:29.291635 949939 usertrap_amd64.go:225] [ 48592: 48592] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:29.292920 949939 usertrap_amd64.go:212] [ 48595: 48595] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:29.293208 949939 usertrap_amd64.go:122] [ 48595: 48595] Allocate a new trap: 0xc000d0a330 42 D0620 03:40:29.293296 949939 usertrap_amd64.go:225] [ 48595: 48595] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:29.299652 949939 usertrap_amd64.go:212] [ 48596: 48596] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:29.299786 949939 usertrap_amd64.go:122] [ 48596: 48596] Allocate a new trap: 0xc0093aee40 42 D0620 03:40:29.299895 949939 usertrap_amd64.go:225] [ 48596: 48596] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:29.301412 949939 task_exit.go:204] [ 48592: 48592] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.301709 949939 task_exit.go:204] [ 48592: 48592] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.301955 949939 task_signals.go:204] [ 48592: 48601] Signal 48592, PID: 48601, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:29.302084 949939 task_exit.go:204] [ 48592: 48601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.302410 949939 task_exit.go:204] [ 48592: 48601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.302467 949939 task_exit.go:204] [ 48592: 48601] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:29.302709 949939 task_signals.go:204] [ 48592: 48594] Signal 48592, PID: 48594, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:29.303039 949939 task_exit.go:204] [ 48592: 48594] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.307822 949939 task_exit.go:204] [ 48592: 48594] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.307914 949939 task_exit.go:204] [ 48592: 48594] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:29.308003 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:29.308756 949939 task_exit.go:204] [ 48592: 48592] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:29 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x4, 0x2) (async) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x4, 0x2) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:29.750801 949939 usertrap_amd64.go:212] [ 48593: 48593] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:29.750907 949939 usertrap_amd64.go:122] [ 48593: 48593] Allocate a new trap: 0xc0093aed80 44 D0620 03:40:29.750993 949939 usertrap_amd64.go:225] [ 48593: 48593] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:29.755523 949939 task_exit.go:204] [ 48593: 48593] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.755774 949939 task_exit.go:204] [ 48593: 48593] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.755972 949939 task_signals.go:204] [ 48593: 48597] Signal 48593, PID: 48597, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:29.756070 949939 task_exit.go:204] [ 48593: 48597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.756273 949939 task_exit.go:204] [ 48593: 48597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.756331 949939 task_exit.go:204] [ 48593: 48597] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:29.756504 949939 task_signals.go:204] [ 48593: 48599] Signal 48593, PID: 48599, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:29.756613 949939 task_exit.go:204] [ 48593: 48599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.756806 949939 task_exit.go:204] [ 48593: 48599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.756857 949939 task_exit.go:204] [ 48593: 48599] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:29.757088 949939 task_signals.go:204] [ 48593: 48600] Signal 48593, PID: 48600, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:29.757222 949939 task_exit.go:204] [ 48593: 48600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.757460 949939 task_exit.go:204] [ 48593: 48600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.757519 949939 task_exit.go:204] [ 48593: 48600] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:29.757686 949939 task_signals.go:204] [ 48593: 48598] Signal 48593, PID: 48598, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:29.757879 949939 task_exit.go:204] [ 48593: 48598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:29.829825 949939 usertrap_amd64.go:212] [ 48596: 48596] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:29.830061 949939 usertrap_amd64.go:122] [ 48596: 48596] Allocate a new trap: 0xc0093aee40 43 D0620 03:40:29.830323 949939 usertrap_amd64.go:225] [ 48596: 48596] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:29.830999 949939 task_exit.go:204] [ 48593: 48598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:29.831181 949939 task_exit.go:204] [ 48593: 48598] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:29.831359 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:29.833074 949939 task_exit.go:204] [ 48593: 48593] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:29 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) fallocate(r0, 0x0, 0x10000000000000, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) r2 = inotify_init1(0x80000) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) fstat(r0, &(0x7f0000000580)) r4 = getuid() mount$9p_unix(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x40002, &(0x7f00000006c0)={'trans=unix,', {[{@cache_fscache}, {@access_uid={'access', 0x3d, r4}}, {@cachetag={'cachetag', 0x3d, '}'}}], [{@permit_directio}]}}) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000002180)='./binderfs/custom0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0x5451, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000180)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) D0620 03:40:29.981772 949939 usertrap_amd64.go:212] [ 48595: 48595] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:29.981986 949939 usertrap_amd64.go:122] [ 48595: 48595] Allocate a new trap: 0xc000d0a330 43 D0620 03:40:29.982150 949939 usertrap_amd64.go:225] [ 48595: 48595] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:30.082559 949939 usertrap_amd64.go:212] [ 48595: 48595] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:30.083281 949939 usertrap_amd64.go:122] [ 48595: 48595] Allocate a new trap: 0xc000d0a330 44 D0620 03:40:30.083365 949939 usertrap_amd64.go:225] [ 48595: 48595] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:30.087993 949939 task_exit.go:204] [ 48595: 48595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.088246 949939 task_exit.go:204] [ 48595: 48595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.125477 949939 usertrap_amd64.go:212] [ 48596: 48596] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:30.125580 949939 usertrap_amd64.go:122] [ 48596: 48596] Allocate a new trap: 0xc0093aee40 44 D0620 03:40:30.125672 949939 usertrap_amd64.go:225] [ 48596: 48596] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:30.166112 949939 task_exit.go:204] [ 48596: 48596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.166650 949939 task_signals.go:204] [ 48596: 48603] Signal 48596, PID: 48603, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.166658 949939 task_signals.go:204] [ 48596: 48607] Signal 48596, PID: 48607, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.166681 949939 task_signals.go:204] [ 48596: 48606] Signal 48596, PID: 48606, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.166779 949939 task_exit.go:204] [ 48596: 48596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.166905 949939 task_signals.go:204] [ 48596: 48608] Signal 48596, PID: 48608, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.167048 949939 task_signals.go:204] [ 48596: 48604] Signal 48596, PID: 48604, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.167161 949939 task_exit.go:204] [ 48596: 48608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.167411 949939 task_exit.go:204] [ 48596: 48608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.167483 949939 task_exit.go:204] [ 48596: 48608] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.167677 949939 task_exit.go:204] [ 48596: 48603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.168008 949939 task_exit.go:204] [ 48596: 48607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.168297 949939 task_exit.go:204] [ 48596: 48606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.168618 949939 task_exit.go:204] [ 48596: 48606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.168680 949939 task_exit.go:204] [ 48596: 48606] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.168855 949939 task_exit.go:204] [ 48596: 48607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.169003 949939 task_exit.go:204] [ 48596: 48607] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.169314 949939 task_exit.go:204] [ 48596: 48603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.169370 949939 task_exit.go:204] [ 48596: 48603] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.169475 949939 task_exit.go:204] [ 48596: 48604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.175174 949939 task_exit.go:204] [ 48596: 48604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.175300 949939 task_exit.go:204] [ 48596: 48604] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.175418 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:30.175655 949939 task_exit.go:204] [ 48596: 48596] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x0) (async, rerun: 64) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e1e, @private=0xa010102}, 0x10) (async, rerun: 64) r3 = accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x80800) accept$inet(r3, 0x0, &(0x7f00000000c0)) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:30.212426 949939 task_signals.go:204] [ 48595: 48610] Signal 48595, PID: 48610, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.212548 949939 task_signals.go:204] [ 48595: 48602] Signal 48595, PID: 48602, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.212547 949939 task_signals.go:204] [ 48595: 48605] Signal 48595, PID: 48605, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.212633 949939 task_exit.go:204] [ 48595: 48610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.212821 949939 task_exit.go:204] [ 48595: 48602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.212985 949939 task_signals.go:204] [ 48595: 48611] Signal 48595, PID: 48611, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.213095 949939 task_exit.go:204] [ 48595: 48602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.213148 949939 task_exit.go:204] [ 48595: 48602] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.213251 949939 usertrap_amd64.go:212] [ 48609: 48609] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:30.213461 949939 usertrap_amd64.go:122] [ 48609: 48609] Allocate a new trap: 0xc01f00ef90 40 D0620 03:40:30.213299 949939 task_exit.go:204] [ 48595: 48611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.213651 949939 task_exit.go:204] [ 48595: 48605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.214241 949939 task_exit.go:204] [ 48595: 48610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.214262 949939 usertrap_amd64.go:225] [ 48609: 48609] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:30.214315 949939 task_exit.go:204] [ 48595: 48610] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.214455 949939 task_exit.go:204] [ 48595: 48611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.214550 949939 task_exit.go:204] [ 48595: 48611] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.219640 949939 task_exit.go:204] [ 48595: 48605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.219727 949939 task_exit.go:204] [ 48595: 48605] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.219819 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:30.220029 949939 task_exit.go:204] [ 48595: 48595] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:30 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f00000000c0)='./file0/file1\x00') (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:30.274503 949939 usertrap_amd64.go:212] [ 48609: 48609] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:30.274637 949939 usertrap_amd64.go:122] [ 48609: 48609] Allocate a new trap: 0xc01f00ef90 41 D0620 03:40:30.274843 949939 usertrap_amd64.go:225] [ 48609: 48609] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:30.299169 949939 usertrap_amd64.go:212] [ 48609: 48609] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:30.299306 949939 usertrap_amd64.go:122] [ 48609: 48609] Allocate a new trap: 0xc01f00ef90 42 D0620 03:40:30.299384 949939 usertrap_amd64.go:225] [ 48609: 48609] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:30.306810 949939 usertrap_amd64.go:212] [ 48614: 48614] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:30.306914 949939 usertrap_amd64.go:122] [ 48614: 48614] Allocate a new trap: 0xc009a00a20 40 D0620 03:40:30.307517 949939 usertrap_amd64.go:225] [ 48614: 48614] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:30.309553 949939 usertrap_amd64.go:212] [ 48613: 48613] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:30.309640 949939 usertrap_amd64.go:122] [ 48613: 48613] Allocate a new trap: 0xc000a709f0 40 D0620 03:40:30.310871 949939 usertrap_amd64.go:225] [ 48613: 48613] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:30.313479 949939 usertrap_amd64.go:212] [ 48614: 48614] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:30.313560 949939 usertrap_amd64.go:122] [ 48614: 48614] Allocate a new trap: 0xc009a00a20 41 D0620 03:40:30.313662 949939 usertrap_amd64.go:225] [ 48614: 48614] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:30.314848 949939 usertrap_amd64.go:212] [ 48612: 48612] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:30.314966 949939 usertrap_amd64.go:122] [ 48612: 48612] Allocate a new trap: 0xc01f00f110 40 D0620 03:40:30.315546 949939 usertrap_amd64.go:225] [ 48612: 48612] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:30.317991 949939 usertrap_amd64.go:212] [ 48613: 48613] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:30.318075 949939 usertrap_amd64.go:122] [ 48613: 48613] Allocate a new trap: 0xc000a709f0 41 D0620 03:40:30.318157 949939 usertrap_amd64.go:225] [ 48613: 48613] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:30.319418 949939 usertrap_amd64.go:212] [ 48612: 48612] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:30.319664 949939 usertrap_amd64.go:122] [ 48612: 48612] Allocate a new trap: 0xc01f00f110 41 D0620 03:40:30.319856 949939 usertrap_amd64.go:225] [ 48612: 48612] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:30.330735 949939 usertrap_amd64.go:212] [ 48614: 48614] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:30.330934 949939 usertrap_amd64.go:122] [ 48614: 48614] Allocate a new trap: 0xc009a00a20 42 D0620 03:40:30.331055 949939 usertrap_amd64.go:225] [ 48614: 48614] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:30.338101 949939 usertrap_amd64.go:212] [ 48612: 48612] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:30.338238 949939 usertrap_amd64.go:122] [ 48612: 48612] Allocate a new trap: 0xc01f00f110 42 D0620 03:40:30.338380 949939 usertrap_amd64.go:225] [ 48612: 48612] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:30.821161 949939 usertrap_amd64.go:212] [ 48614: 48614] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:30.821200 949939 usertrap_amd64.go:212] [ 48609: 48609] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:30.821285 949939 usertrap_amd64.go:122] [ 48614: 48614] Allocate a new trap: 0xc009a00a20 43 D0620 03:40:30.821335 949939 usertrap_amd64.go:122] [ 48609: 48609] Allocate a new trap: 0xc01f00ef90 43 D0620 03:40:30.821431 949939 usertrap_amd64.go:225] [ 48614: 48614] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:30.821442 949939 usertrap_amd64.go:225] [ 48609: 48609] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:30.824082 949939 usertrap_amd64.go:212] [ 48613: 48613] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:30.824237 949939 usertrap_amd64.go:122] [ 48613: 48613] Allocate a new trap: 0xc000a709f0 42 D0620 03:40:30.824322 949939 usertrap_amd64.go:225] [ 48613: 48613] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:30.834293 949939 task_exit.go:204] [ 48609: 48609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.834637 949939 task_signals.go:204] [ 48609: 48615] Signal 48609, PID: 48615, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.834720 949939 task_exit.go:204] [ 48609: 48609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.834829 949939 task_exit.go:204] [ 48609: 48615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.834824 949939 task_signals.go:204] [ 48609: 48622] Signal 48609, PID: 48622, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.835004 949939 task_exit.go:204] [ 48609: 48622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.835196 949939 task_signals.go:204] [ 48609: 48616] Signal 48609, PID: 48616, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:30.835321 949939 task_exit.go:204] [ 48609: 48622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.835399 949939 task_exit.go:204] [ 48609: 48622] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.835602 949939 task_exit.go:204] [ 48609: 48615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.835658 949939 task_exit.go:204] [ 48609: 48615] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.835772 949939 task_exit.go:204] [ 48609: 48616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:30.841256 949939 task_exit.go:204] [ 48609: 48616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:30.841330 949939 task_exit.go:204] [ 48609: 48616] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:30.841426 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:30.842229 949939 task_exit.go:204] [ 48609: 48609] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:30 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x4, 0x2) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:30.886187 949939 usertrap_amd64.go:212] [ 48613: 48613] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:30.886346 949939 usertrap_amd64.go:122] [ 48613: 48613] Allocate a new trap: 0xc000a709f0 43 D0620 03:40:30.886434 949939 usertrap_amd64.go:225] [ 48613: 48613] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:30.999829 949939 usertrap_amd64.go:212] [ 48612: 48612] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:30.999963 949939 usertrap_amd64.go:122] [ 48612: 48612] Allocate a new trap: 0xc01f00f110 43 D0620 03:40:31.000063 949939 usertrap_amd64.go:225] [ 48612: 48612] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:31.157434 949939 usertrap_amd64.go:212] [ 48614: 48614] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:31.157546 949939 usertrap_amd64.go:122] [ 48614: 48614] Allocate a new trap: 0xc009a00a20 44 D0620 03:40:31.157669 949939 usertrap_amd64.go:225] [ 48614: 48614] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:31.161742 949939 task_exit.go:204] [ 48614: 48614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.161966 949939 task_signals.go:204] [ 48614: 48619] Signal 48614, PID: 48619, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.161985 949939 task_signals.go:204] [ 48614: 48620] Signal 48614, PID: 48620, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.162235 949939 task_exit.go:204] [ 48614: 48620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.162480 949939 task_signals.go:204] [ 48614: 48617] Signal 48614, PID: 48617, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.162477 949939 task_signals.go:204] [ 48614: 48623] Signal 48614, PID: 48623, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.162559 949939 task_exit.go:204] [ 48614: 48620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.162632 949939 task_exit.go:204] [ 48614: 48620] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.162808 949939 task_exit.go:204] [ 48614: 48623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.163185 949939 task_exit.go:204] [ 48614: 48619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.163456 949939 task_exit.go:204] [ 48614: 48617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.163680 949939 task_exit.go:204] [ 48614: 48619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.163753 949939 task_exit.go:204] [ 48614: 48619] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.164167 949939 task_exit.go:204] [ 48614: 48614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.164187 949939 usertrap_amd64.go:212] [ 48612: 48612] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:31.164278 949939 usertrap_amd64.go:122] [ 48612: 48612] Allocate a new trap: 0xc01f00f110 44 D0620 03:40:31.164405 949939 usertrap_amd64.go:225] [ 48612: 48612] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:31.164525 949939 task_exit.go:204] [ 48614: 48617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.164696 949939 task_exit.go:204] [ 48614: 48617] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.168806 949939 task_exit.go:204] [ 48614: 48623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.168883 949939 task_exit.go:204] [ 48614: 48623] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.169039 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:31.169988 949939 task_exit.go:204] [ 48614: 48614] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80080) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x301800, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r4 = inotify_init1(0x80000) r5 = dup3(r3, r4, 0x80000) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r6 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:31.178454 949939 usertrap_amd64.go:212] [ 48613: 48613] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:31.178544 949939 usertrap_amd64.go:122] [ 48613: 48613] Allocate a new trap: 0xc000a709f0 44 D0620 03:40:31.178695 949939 usertrap_amd64.go:225] [ 48613: 48613] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:31.182605 949939 task_exit.go:204] [ 48613: 48613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.182964 949939 task_exit.go:204] [ 48613: 48613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.245827 949939 task_signals.go:204] [ 48613: 48628] Signal 48613, PID: 48628, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.245977 949939 task_signals.go:204] [ 48613: 48626] Signal 48613, PID: 48626, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.246022 949939 task_exit.go:204] [ 48613: 48628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.245856 949939 task_signals.go:204] [ 48613: 48627] Signal 48613, PID: 48627, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.246347 949939 task_signals.go:204] [ 48613: 48625] Signal 48613, PID: 48625, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.246446 949939 task_exit.go:204] [ 48613: 48626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.246642 949939 task_exit.go:204] [ 48613: 48625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.246805 949939 task_exit.go:204] [ 48613: 48628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.246872 949939 task_exit.go:204] [ 48613: 48628] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.247065 949939 task_exit.go:204] [ 48613: 48625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.247157 949939 task_exit.go:204] [ 48613: 48625] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.247309 949939 task_exit.go:204] [ 48613: 48626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.247364 949939 task_exit.go:204] [ 48613: 48626] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.247471 949939 task_exit.go:204] [ 48613: 48627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.247778 949939 task_exit.go:204] [ 48612: 48612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.247933 949939 task_signals.go:204] [ 48612: 48631] Signal 48612, PID: 48631, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.248015 949939 task_exit.go:204] [ 48612: 48631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.248493 949939 task_signals.go:204] [ 48612: 48621] Signal 48612, PID: 48621, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.248636 949939 task_exit.go:204] [ 48612: 48621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.248885 949939 task_exit.go:204] [ 48612: 48621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.248987 949939 task_exit.go:204] [ 48612: 48621] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.249117 949939 task_exit.go:204] [ 48612: 48612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.249348 949939 task_signals.go:204] [ 48612: 48624] Signal 48612, PID: 48624, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.249519 949939 task_exit.go:204] [ 48612: 48624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.249542 949939 task_signals.go:204] [ 48612: 48618] Signal 48612, PID: 48618, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.249653 949939 task_signals.go:204] [ 48612: 48630] Signal 48612, PID: 48630, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.249706 949939 task_exit.go:204] [ 48612: 48618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.249801 949939 task_exit.go:204] [ 48612: 48630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.249875 949939 task_signals.go:204] [ 48612: 48629] Signal 48612, PID: 48629, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:31.249957 949939 task_exit.go:204] [ 48612: 48629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:31.250243 949939 task_exit.go:204] [ 48612: 48629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.250293 949939 task_exit.go:204] [ 48612: 48629] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.250455 949939 task_exit.go:204] [ 48612: 48630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.250509 949939 task_exit.go:204] [ 48612: 48630] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.250629 949939 task_exit.go:204] [ 48612: 48631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.250686 949939 task_exit.go:204] [ 48612: 48631] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.251015 949939 task_exit.go:204] [ 48612: 48624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.251080 949939 task_exit.go:204] [ 48612: 48624] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.254318 949939 task_exit.go:204] [ 48613: 48627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.254394 949939 task_exit.go:204] [ 48613: 48627] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.254518 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:31.254784 949939 task_exit.go:204] [ 48613: 48613] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:31 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f00000000c0)='./file0/file1\x00') truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:31.256464 949939 task_exit.go:204] [ 48612: 48618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:31.256530 949939 task_exit.go:204] [ 48612: 48618] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:31.256628 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:31.257166 949939 task_exit.go:204] [ 48612: 48612] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:31 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) (async, rerun: 32) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) (async, rerun: 32) fallocate(r0, 0x0, 0x10000000000000, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) r2 = inotify_init1(0x80000) (async) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) (async) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) (async, rerun: 64) fstat(r0, &(0x7f0000000580)) (rerun: 64) r4 = getuid() mount$9p_unix(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x40002, &(0x7f00000006c0)={'trans=unix,', {[{@cache_fscache}, {@access_uid={'access', 0x3d, r4}}, {@cachetag={'cachetag', 0x3d, '}'}}], [{@permit_directio}]}}) (async, rerun: 64) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000002180)='./binderfs/custom0\x00', 0x0, 0x0) (rerun: 64) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0x5451, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000180)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) D0620 03:40:31.340572 949939 usertrap_amd64.go:212] [ 48632: 48632] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:31.340748 949939 usertrap_amd64.go:122] [ 48632: 48632] Allocate a new trap: 0xc006c98a80 40 D0620 03:40:31.341501 949939 usertrap_amd64.go:212] [ 48633: 48633] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:31.341681 949939 usertrap_amd64.go:122] [ 48633: 48633] Allocate a new trap: 0xc009c86d50 40 D0620 03:40:31.341763 949939 usertrap_amd64.go:225] [ 48632: 48632] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:31.342484 949939 usertrap_amd64.go:225] [ 48633: 48633] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:31.346071 949939 usertrap_amd64.go:212] [ 48635: 48635] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:31.346223 949939 usertrap_amd64.go:122] [ 48635: 48635] Allocate a new trap: 0xc006c98ab0 40 D0620 03:40:31.346887 949939 usertrap_amd64.go:225] [ 48635: 48635] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:31.348458 949939 usertrap_amd64.go:212] [ 48632: 48632] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:31.348526 949939 usertrap_amd64.go:122] [ 48632: 48632] Allocate a new trap: 0xc006c98a80 41 D0620 03:40:31.348594 949939 usertrap_amd64.go:225] [ 48632: 48632] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:31.350342 949939 usertrap_amd64.go:212] [ 48634: 48634] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:31.350489 949939 usertrap_amd64.go:122] [ 48634: 48634] Allocate a new trap: 0xc0066f2d50 40 D0620 03:40:31.352225 949939 usertrap_amd64.go:225] [ 48634: 48634] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:31.352228 949939 usertrap_amd64.go:212] [ 48635: 48635] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:31.352612 949939 usertrap_amd64.go:122] [ 48635: 48635] Allocate a new trap: 0xc006c98ab0 41 D0620 03:40:31.352708 949939 usertrap_amd64.go:225] [ 48635: 48635] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:31.355953 949939 usertrap_amd64.go:212] [ 48634: 48634] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:31.356101 949939 usertrap_amd64.go:122] [ 48634: 48634] Allocate a new trap: 0xc0066f2d50 41 D0620 03:40:31.356179 949939 usertrap_amd64.go:225] [ 48634: 48634] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:31.358411 949939 usertrap_amd64.go:212] [ 48633: 48633] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:31.358526 949939 usertrap_amd64.go:122] [ 48633: 48633] Allocate a new trap: 0xc009c86d50 41 D0620 03:40:31.358640 949939 usertrap_amd64.go:225] [ 48633: 48633] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:31.374630 949939 usertrap_amd64.go:212] [ 48634: 48634] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:31.374749 949939 usertrap_amd64.go:122] [ 48634: 48634] Allocate a new trap: 0xc0066f2d50 42 D0620 03:40:31.374873 949939 usertrap_amd64.go:225] [ 48634: 48634] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:31.376791 949939 usertrap_amd64.go:212] [ 48633: 48633] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:31.376875 949939 usertrap_amd64.go:122] [ 48633: 48633] Allocate a new trap: 0xc009c86d50 42 D0620 03:40:31.377021 949939 usertrap_amd64.go:225] [ 48633: 48633] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:31.378136 949939 usertrap_amd64.go:212] [ 48632: 48632] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:31.378218 949939 usertrap_amd64.go:122] [ 48632: 48632] Allocate a new trap: 0xc006c98a80 42 D0620 03:40:31.378434 949939 usertrap_amd64.go:225] [ 48632: 48632] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:31.380088 949939 usertrap_amd64.go:212] [ 48635: 48635] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:31.380181 949939 usertrap_amd64.go:122] [ 48635: 48635] Allocate a new trap: 0xc006c98ab0 42 D0620 03:40:31.380278 949939 usertrap_amd64.go:225] [ 48635: 48635] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:31.900163 949939 usertrap_amd64.go:212] [ 48633: 48633] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:32.326967 949939 usertrap_amd64.go:122] [ 48633: 48633] Allocate a new trap: 0xc009c86d50 43 D0620 03:40:32.327086 949939 usertrap_amd64.go:225] [ 48633: 48633] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:32.330957 949939 usertrap_amd64.go:212] [ 48632: 48632] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:32.331073 949939 usertrap_amd64.go:212] [ 48633: 48633] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:32.331096 949939 usertrap_amd64.go:122] [ 48632: 48632] Allocate a new trap: 0xc006c98a80 43 D0620 03:40:32.331159 949939 usertrap_amd64.go:122] [ 48633: 48633] Allocate a new trap: 0xc009c86d50 44 D0620 03:40:32.331306 949939 usertrap_amd64.go:225] [ 48632: 48632] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:32.331304 949939 usertrap_amd64.go:225] [ 48633: 48633] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:32.347617 949939 task_exit.go:204] [ 48632: 48632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.347968 949939 task_exit.go:204] [ 48632: 48632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.348147 949939 task_signals.go:204] [ 48632: 48645] Signal 48632, PID: 48645, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.348247 949939 task_signals.go:204] [ 48632: 48638] Signal 48632, PID: 48638, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.348359 949939 task_exit.go:204] [ 48632: 48645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.348654 949939 task_signals.go:204] [ 48632: 48641] Signal 48632, PID: 48641, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.348663 949939 task_exit.go:204] [ 48632: 48645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.348748 949939 task_exit.go:204] [ 48632: 48645] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.348973 949939 task_exit.go:204] [ 48632: 48638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.349305 949939 task_exit.go:204] [ 48632: 48641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.349604 949939 task_exit.go:204] [ 48632: 48638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.349734 949939 task_exit.go:204] [ 48632: 48638] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.350002 949939 task_exit.go:204] [ 48633: 48633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.350406 949939 task_signals.go:204] [ 48633: 48643] Signal 48633, PID: 48643, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.350668 949939 task_signals.go:204] [ 48633: 48637] Signal 48633, PID: 48637, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.350802 949939 task_exit.go:204] [ 48633: 48633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.351025 949939 task_exit.go:204] [ 48633: 48643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.351427 949939 task_exit.go:204] [ 48633: 48643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.351495 949939 task_exit.go:204] [ 48633: 48643] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.351607 949939 task_exit.go:204] [ 48633: 48637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.356514 949939 task_exit.go:204] [ 48632: 48641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.356626 949939 task_exit.go:204] [ 48632: 48641] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.356740 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:32.357337 949939 task_exit.go:204] [ 48632: 48632] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.359096 949939 task_exit.go:204] [ 48633: 48637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.359215 949939 task_exit.go:204] [ 48633: 48637] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.359373 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:32.360235 949939 task_exit.go:204] [ 48633: 48633] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:32 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0xf, &(0x7f0000000100)={0x7fffffffffffffff, 0xffffffffffffffff}) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') 03:40:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80080) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x301800, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r4 = inotify_init1(0x80000) r5 = dup3(r3, r4, 0x80000) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r6 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x0) (async) pipe2(&(0x7f0000000080), 0x80080) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) open(&(0x7f0000000100)='./file0\x00', 0x301800, 0x0) (async) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) (async) inotify_init1(0x80000) (async) dup3(r3, r4, 0x80000) (async) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) accept4$inet(r1, 0x0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0x0) (async) D0620 03:40:32.428140 949939 usertrap_amd64.go:212] [ 48634: 48634] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:32.428297 949939 usertrap_amd64.go:122] [ 48634: 48634] Allocate a new trap: 0xc0066f2d50 43 D0620 03:40:32.428403 949939 usertrap_amd64.go:225] [ 48634: 48634] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:32.433829 949939 task_signals.go:204] [ 48634: 48640] Signal 48634, PID: 48640, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.434268 949939 task_signals.go:204] [ 48634: 48642] Signal 48634, PID: 48642, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.434564 949939 task_exit.go:204] [ 48634: 48640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.435176 949939 task_signals.go:204] [ 48634: 48636] Signal 48634, PID: 48636, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.435237 949939 usertrap_amd64.go:212] [ 48635: 48635] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:32.435281 949939 task_signals.go:204] [ 48634: 48646] Signal 48634, PID: 48646, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.435361 949939 usertrap_amd64.go:122] [ 48635: 48635] Allocate a new trap: 0xc006c98ab0 43 D0620 03:40:32.435345 949939 task_exit.go:204] [ 48634: 48634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.435444 949939 usertrap_amd64.go:225] [ 48635: 48635] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:32.435514 949939 task_exit.go:204] [ 48634: 48640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.435560 949939 task_exit.go:204] [ 48634: 48640] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.435767 949939 task_exit.go:204] [ 48634: 48636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.435989 949939 task_exit.go:204] [ 48634: 48634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.436248 949939 task_exit.go:204] [ 48634: 48636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.436298 949939 task_exit.go:204] [ 48634: 48636] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.436774 949939 task_exit.go:204] [ 48634: 48646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.437068 949939 task_exit.go:204] [ 48634: 48646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.437128 949939 task_exit.go:204] [ 48634: 48646] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.437358 949939 task_exit.go:204] [ 48634: 48642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.448450 949939 task_exit.go:204] [ 48634: 48642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.448542 949939 task_exit.go:204] [ 48634: 48642] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.448668 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:32.449737 949939 task_exit.go:204] [ 48634: 48634] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:32 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) fallocate(r0, 0x0, 0x10000000000000, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) r2 = inotify_init1(0x80000) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) fstat(r0, &(0x7f0000000580)) r4 = getuid() mount$9p_unix(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x40002, &(0x7f00000006c0)={'trans=unix,', {[{@cache_fscache}, {@access_uid={'access', 0x3d, r4}}, {@cachetag={'cachetag', 0x3d, '}'}}], [{@permit_directio}]}}) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000002180)='./binderfs/custom0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0x5451, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000180)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (async) ioctl$TCSETAW(r1, 0x5450, 0x0) (async) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) (async) fallocate(r0, 0x0, 0x10000000000000, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) inotify_init1(0x80000) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) ioctl$FIONCLEX(r3, 0x5450) (async) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) (async) fstat(r0, &(0x7f0000000580)) (async) getuid() (async) mount$9p_unix(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x40002, &(0x7f00000006c0)={'trans=unix,', {[{@cache_fscache}, {@access_uid={'access', 0x3d, r4}}, {@cachetag={'cachetag', 0x3d, '}'}}], [{@permit_directio}]}}) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000002180)='./binderfs/custom0\x00', 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0x5451, 0x0) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000180)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) (async) D0620 03:40:32.457108 949939 usertrap_amd64.go:212] [ 48648: 48648] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:32.457267 949939 usertrap_amd64.go:122] [ 48648: 48648] Allocate a new trap: 0xc00037ed80 40 D0620 03:40:32.457510 949939 usertrap_amd64.go:212] [ 48649: 48649] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:32.457720 949939 usertrap_amd64.go:122] [ 48649: 48649] Allocate a new trap: 0xc014b20480 40 D0620 03:40:32.458059 949939 usertrap_amd64.go:225] [ 48648: 48648] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:32.458599 949939 usertrap_amd64.go:225] [ 48649: 48649] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:32.463726 949939 usertrap_amd64.go:212] [ 48649: 48649] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:32.463852 949939 usertrap_amd64.go:122] [ 48649: 48649] Allocate a new trap: 0xc014b20480 41 D0620 03:40:32.463939 949939 usertrap_amd64.go:225] [ 48649: 48649] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:32.465749 949939 usertrap_amd64.go:212] [ 48648: 48648] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:32.465843 949939 usertrap_amd64.go:122] [ 48648: 48648] Allocate a new trap: 0xc00037ed80 41 D0620 03:40:32.465917 949939 usertrap_amd64.go:225] [ 48648: 48648] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:32.537058 949939 usertrap_amd64.go:212] [ 48635: 48635] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:32.537202 949939 usertrap_amd64.go:122] [ 48635: 48635] Allocate a new trap: 0xc006c98ab0 44 D0620 03:40:32.537285 949939 usertrap_amd64.go:225] [ 48635: 48635] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:32.783058 949939 task_exit.go:204] [ 48635: 48635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.783322 949939 task_exit.go:204] [ 48635: 48635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.783498 949939 task_signals.go:204] [ 48635: 48644] Signal 48635, PID: 48644, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.783588 949939 task_signals.go:204] [ 48635: 48647] Signal 48635, PID: 48647, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.783622 949939 task_signals.go:204] [ 48635: 48639] Signal 48635, PID: 48639, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.783756 949939 task_exit.go:204] [ 48635: 48644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.784109 949939 task_exit.go:204] [ 48635: 48644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.784197 949939 task_exit.go:204] [ 48635: 48644] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.784349 949939 task_exit.go:204] [ 48635: 48647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.784580 949939 task_exit.go:204] [ 48635: 48647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.784655 949939 task_exit.go:204] [ 48635: 48647] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.784788 949939 task_exit.go:204] [ 48635: 48639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.866361 949939 task_exit.go:204] [ 48635: 48639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.866501 949939 task_exit.go:204] [ 48635: 48639] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.866629 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:32.867382 949939 task_exit.go:204] [ 48635: 48635] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:32 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0x3, &(0x7f0000000240)={0x0, 0x6}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) readlinkat(r1, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=""/137, 0x89) D0620 03:40:32.874732 949939 usertrap_amd64.go:212] [ 48649: 48649] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:32.874849 949939 usertrap_amd64.go:122] [ 48649: 48649] Allocate a new trap: 0xc014b20480 42 D0620 03:40:32.874939 949939 usertrap_amd64.go:225] [ 48649: 48649] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:32.880990 949939 usertrap_amd64.go:212] [ 48648: 48648] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:32.881086 949939 usertrap_amd64.go:122] [ 48648: 48648] Allocate a new trap: 0xc00037ed80 42 D0620 03:40:32.881161 949939 usertrap_amd64.go:225] [ 48648: 48648] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:32.881750 949939 usertrap_amd64.go:212] [ 48650: 48650] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:32.881910 949939 usertrap_amd64.go:122] [ 48650: 48650] Allocate a new trap: 0xc00037eea0 40 D0620 03:40:32.882516 949939 usertrap_amd64.go:225] [ 48650: 48650] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:32.886259 949939 usertrap_amd64.go:212] [ 48650: 48650] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:32.886351 949939 usertrap_amd64.go:122] [ 48650: 48650] Allocate a new trap: 0xc00037eea0 41 D0620 03:40:32.886436 949939 usertrap_amd64.go:225] [ 48650: 48650] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:32.890763 949939 task_signals.go:470] [ 48648: 48652] Notified of signal 25 D0620 03:40:32.891113 949939 task_signals.go:204] [ 48648: 48652] Signal 48648, PID: 48652, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:32.891310 949939 task_exit.go:204] [ 48648: 48652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.891516 949939 task_exit.go:204] [ 48648: 48652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.891566 949939 task_exit.go:204] [ 48648: 48652] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:32.891737 949939 task_signals.go:204] [ 48648: 48648] Signal 48648, PID: 48648, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:32.891826 949939 task_exit.go:204] [ 48648: 48648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:32.895890 949939 task_exit.go:204] [ 48648: 48648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:32.896046 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:32.897695 949939 usertrap_amd64.go:212] [ 48653: 48653] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:32.897789 949939 usertrap_amd64.go:122] [ 48653: 48653] Allocate a new trap: 0xc0066f2fc0 40 D0620 03:40:32.898373 949939 usertrap_amd64.go:225] [ 48653: 48653] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:32.897587 949939 task_exit.go:204] [ 48648: 48648] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:32 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0xf, &(0x7f0000000100)={0x7fffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:32.903869 949939 usertrap_amd64.go:212] [ 48653: 48653] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:32.903940 949939 usertrap_amd64.go:122] [ 48653: 48653] Allocate a new trap: 0xc0066f2fc0 41 D0620 03:40:32.904016 949939 usertrap_amd64.go:225] [ 48653: 48653] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:32.908027 949939 usertrap_amd64.go:212] [ 48650: 48650] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:32.908107 949939 usertrap_amd64.go:122] [ 48650: 48650] Allocate a new trap: 0xc00037eea0 42 D0620 03:40:32.908198 949939 usertrap_amd64.go:225] [ 48650: 48650] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:32.919596 949939 usertrap_amd64.go:212] [ 48653: 48653] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:32.919737 949939 usertrap_amd64.go:122] [ 48653: 48653] Allocate a new trap: 0xc0066f2fc0 42 D0620 03:40:32.919857 949939 usertrap_amd64.go:225] [ 48653: 48653] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:33.424824 949939 usertrap_amd64.go:212] [ 48655: 48655] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:33.425011 949939 usertrap_amd64.go:122] [ 48655: 48655] Allocate a new trap: 0xc014b20570 40 D0620 03:40:33.426256 949939 usertrap_amd64.go:225] [ 48655: 48655] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:33.429413 949939 usertrap_amd64.go:212] [ 48655: 48655] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:33.429546 949939 usertrap_amd64.go:122] [ 48655: 48655] Allocate a new trap: 0xc014b20570 41 D0620 03:40:33.429637 949939 usertrap_amd64.go:225] [ 48655: 48655] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:33.435696 949939 usertrap_amd64.go:212] [ 48649: 48649] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:33.435796 949939 usertrap_amd64.go:122] [ 48649: 48649] Allocate a new trap: 0xc014b20480 43 D0620 03:40:33.435880 949939 usertrap_amd64.go:225] [ 48649: 48649] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:33.535408 949939 usertrap_amd64.go:212] [ 48653: 48653] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:33.535541 949939 usertrap_amd64.go:122] [ 48653: 48653] Allocate a new trap: 0xc0066f2fc0 43 D0620 03:40:33.535669 949939 usertrap_amd64.go:225] [ 48653: 48653] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:33.580768 949939 usertrap_amd64.go:212] [ 48650: 48650] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:33.580846 949939 usertrap_amd64.go:122] [ 48650: 48650] Allocate a new trap: 0xc00037eea0 43 D0620 03:40:33.580998 949939 usertrap_amd64.go:225] [ 48650: 48650] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:33.811132 949939 usertrap_amd64.go:212] [ 48649: 48649] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:33.811235 949939 usertrap_amd64.go:122] [ 48649: 48649] Allocate a new trap: 0xc014b20480 44 D0620 03:40:33.811178 949939 usertrap_amd64.go:212] [ 48653: 48653] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:33.811323 949939 usertrap_amd64.go:225] [ 48649: 48649] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:33.811374 949939 usertrap_amd64.go:122] [ 48653: 48653] Allocate a new trap: 0xc0066f2fc0 44 D0620 03:40:33.811627 949939 usertrap_amd64.go:225] [ 48653: 48653] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:33.812285 949939 usertrap_amd64.go:212] [ 48650: 48650] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:33.812397 949939 usertrap_amd64.go:122] [ 48650: 48650] Allocate a new trap: 0xc00037eea0 44 D0620 03:40:33.812528 949939 usertrap_amd64.go:225] [ 48650: 48650] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:33.819084 949939 task_exit.go:204] [ 48650: 48650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.819385 949939 task_exit.go:204] [ 48650: 48650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.819754 949939 task_signals.go:204] [ 48650: 48659] Signal 48650, PID: 48659, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.819846 949939 task_exit.go:204] [ 48650: 48659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.820083 949939 task_exit.go:204] [ 48650: 48659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.820138 949939 task_exit.go:204] [ 48650: 48659] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.820434 949939 task_signals.go:204] [ 48650: 48654] Signal 48650, PID: 48654, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.820542 949939 task_exit.go:204] [ 48650: 48654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.820731 949939 task_exit.go:204] [ 48650: 48654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.820789 949939 task_exit.go:204] [ 48650: 48654] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.820931 949939 task_signals.go:204] [ 48650: 48669] Signal 48650, PID: 48669, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.821358 949939 task_exit.go:204] [ 48650: 48669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.821612 949939 task_signals.go:204] [ 48650: 48674] Signal 48650, PID: 48674, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.821656 949939 task_signals.go:204] [ 48650: 48675] Signal 48650, PID: 48675, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.821799 949939 task_signals.go:204] [ 48650: 48678] Signal 48650, PID: 48678, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.821842 949939 task_signals.go:204] [ 48650: 48676] Signal 48650, PID: 48676, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.821869 949939 task_signals.go:204] [ 48650: 48673] Signal 48650, PID: 48673, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.821904 949939 task_signals.go:204] [ 48650: 48672] Signal 48650, PID: 48672, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.822114 949939 task_signals.go:204] [ 48650: 48671] Signal 48650, PID: 48671, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.822175 949939 task_exit.go:204] [ 48650: 48675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.822131 949939 task_signals.go:204] [ 48650: 48670] Signal 48650, PID: 48670, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.822268 949939 task_signals.go:204] [ 48650: 48677] Signal 48650, PID: 48677, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.822416 949939 task_signals.go:204] [ 48650: 48666] Signal 48650, PID: 48666, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.822513 949939 task_exit.go:204] [ 48650: 48666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.822677 949939 task_exit.go:204] [ 48650: 48669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.822872 949939 task_exit.go:204] [ 48650: 48669] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.823247 949939 task_exit.go:204] [ 48650: 48666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.824142 949939 task_exit.go:204] [ 48650: 48666] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.824397 949939 task_exit.go:204] [ 48650: 48674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.824618 949939 task_exit.go:204] [ 48650: 48673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.825013 949939 task_exit.go:204] [ 48650: 48678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.825252 949939 task_exit.go:204] [ 48650: 48678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.825312 949939 task_exit.go:204] [ 48650: 48678] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.825418 949939 task_exit.go:204] [ 48650: 48674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.825464 949939 task_exit.go:204] [ 48650: 48674] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.825567 949939 task_exit.go:204] [ 48650: 48670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.825730 949939 task_exit.go:204] [ 48650: 48670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.825810 949939 task_exit.go:204] [ 48650: 48670] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.825933 949939 task_exit.go:204] [ 48650: 48677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.826297 949939 task_exit.go:204] [ 48650: 48671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.827001 949939 task_exit.go:204] [ 48650: 48675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.827129 949939 task_exit.go:204] [ 48650: 48675] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.827306 949939 task_exit.go:204] [ 48650: 48672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.827459 949939 task_signals.go:204] [ 48649: 48657] Signal 48649, PID: 48657, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.827558 949939 task_signals.go:204] [ 48649: 48665] Signal 48649, PID: 48665, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.827608 949939 task_signals.go:204] [ 48649: 48651] Signal 48649, PID: 48651, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.827756 949939 task_exit.go:204] [ 48649: 48651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.827707 949939 task_signals.go:204] [ 48649: 48663] Signal 48649, PID: 48663, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.827973 949939 task_signals.go:204] [ 48649: 48660] Signal 48649, PID: 48660, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.828040 949939 task_signals.go:204] [ 48649: 48664] Signal 48649, PID: 48664, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.828160 949939 task_exit.go:204] [ 48650: 48676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.828382 949939 task_signals.go:204] [ 48649: 48662] Signal 48649, PID: 48662, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.828677 949939 task_exit.go:204] [ 48650: 48677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.828757 949939 task_exit.go:204] [ 48650: 48677] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.828925 949939 task_exit.go:204] [ 48649: 48665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.829218 949939 task_exit.go:204] [ 48649: 48657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.829332 949939 task_exit.go:204] [ 48649: 48663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.829463 949939 task_exit.go:204] [ 48650: 48673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.829522 949939 task_exit.go:204] [ 48650: 48673] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.829732 949939 task_exit.go:204] [ 48650: 48672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.829863 949939 task_exit.go:204] [ 48650: 48672] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.830058 949939 task_exit.go:204] [ 48649: 48660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.830327 949939 task_exit.go:204] [ 48649: 48660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.830364 949939 task_exit.go:204] [ 48649: 48660] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.830457 949939 task_exit.go:204] [ 48649: 48664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.830667 949939 task_exit.go:204] [ 48649: 48664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.830742 949939 task_exit.go:204] [ 48649: 48664] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.830857 949939 task_exit.go:204] [ 48649: 48662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.830972 949939 task_exit.go:204] [ 48650: 48671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.831037 949939 task_exit.go:204] [ 48650: 48671] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.831191 949939 task_exit.go:204] [ 48649: 48649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.831485 949939 task_exit.go:204] [ 48649: 48649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.832007 949939 task_exit.go:204] [ 48649: 48651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.832075 949939 task_exit.go:204] [ 48649: 48651] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.832225 949939 task_exit.go:204] [ 48649: 48662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.832284 949939 task_exit.go:204] [ 48649: 48662] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.832425 949939 task_exit.go:204] [ 48649: 48665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.832514 949939 task_exit.go:204] [ 48649: 48665] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.832742 949939 task_exit.go:204] [ 48649: 48657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.832914 949939 task_exit.go:204] [ 48649: 48657] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.837547 949939 task_exit.go:204] [ 48653: 48653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.838003 949939 task_exit.go:204] [ 48653: 48653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.838189 949939 task_signals.go:204] [ 48653: 48667] Signal 48653, PID: 48667, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.838300 949939 task_signals.go:204] [ 48653: 48658] Signal 48653, PID: 48658, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.838359 949939 task_signals.go:204] [ 48653: 48668] Signal 48653, PID: 48668, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.838471 949939 task_signals.go:204] [ 48653: 48656] Signal 48653, PID: 48656, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.838545 949939 task_exit.go:204] [ 48653: 48658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.838685 949939 task_signals.go:204] [ 48653: 48661] Signal 48653, PID: 48661, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.838759 949939 task_exit.go:204] [ 48653: 48658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.838822 949939 task_exit.go:204] [ 48653: 48658] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.838984 949939 task_exit.go:204] [ 48653: 48668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.839248 949939 task_exit.go:204] [ 48653: 48661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.839652 949939 task_exit.go:204] [ 48653: 48667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.840090 949939 task_exit.go:204] [ 48653: 48656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.840388 949939 task_exit.go:204] [ 48653: 48668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.840520 949939 task_exit.go:204] [ 48653: 48668] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.841022 949939 task_exit.go:204] [ 48650: 48676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.841093 949939 task_exit.go:204] [ 48650: 48676] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.841210 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:33.841439 949939 task_exit.go:204] [ 48653: 48661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.841548 949939 task_exit.go:204] [ 48653: 48661] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.841796 949939 task_exit.go:204] [ 48650: 48650] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.842187 949939 task_exit.go:204] [ 48653: 48667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.842293 949939 task_exit.go:204] [ 48653: 48667] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.843015 949939 task_exit.go:204] [ 48649: 48663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.843101 949939 task_exit.go:204] [ 48649: 48663] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.843224 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 03:40:33 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0xa8100, 0xc4) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setrlimit(0xc, &(0x7f0000000180)={0x6a17, 0x1}) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200), &(0x7f00000001c0), 0x2, 0x1) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:33.844644 949939 task_exit.go:204] [ 48649: 48649] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:33 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) (async) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80080) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x301800, 0x0) (async) open(&(0x7f0000000100)='./file0\x00', 0x301800, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r4 = inotify_init1(0x80000) r5 = dup3(r3, r4, 0x80000) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) accept4$inet(r1, 0x0, 0x0, 0x0) (async) r6 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:33.845854 949939 usertrap_amd64.go:212] [ 48655: 48655] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:33.845951 949939 usertrap_amd64.go:122] [ 48655: 48655] Allocate a new trap: 0xc014b20570 42 D0620 03:40:33.846078 949939 usertrap_amd64.go:225] [ 48655: 48655] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:33.847815 949939 task_exit.go:204] [ 48653: 48656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.847968 949939 task_exit.go:204] [ 48653: 48656] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.848097 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:33.848223 949939 task_exit.go:204] [ 48653: 48653] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:33 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0x3, &(0x7f0000000240)={0x0, 0x6}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) readlinkat(r1, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=""/137, 0x89) (async) readlinkat(r1, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=""/137, 0x89) D0620 03:40:33.930932 949939 task_signals.go:470] [ 48655: 48679] Notified of signal 25 D0620 03:40:33.931567 949939 task_signals.go:204] [ 48655: 48679] Signal 48655, PID: 48679, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:33.931796 949939 task_exit.go:204] [ 48655: 48679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.931983 949939 task_exit.go:204] [ 48655: 48679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.932032 949939 task_exit.go:204] [ 48655: 48679] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.932229 949939 task_signals.go:204] [ 48655: 48680] Signal 48655, PID: 48680, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.932341 949939 task_exit.go:204] [ 48655: 48680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.932541 949939 task_exit.go:204] [ 48655: 48680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.932591 949939 task_exit.go:204] [ 48655: 48680] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.933226 949939 task_signals.go:204] [ 48655: 48681] Signal 48655, PID: 48681, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.933517 949939 task_exit.go:204] [ 48655: 48681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.933897 949939 task_exit.go:204] [ 48655: 48681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.933996 949939 task_exit.go:204] [ 48655: 48681] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:33.934296 949939 task_signals.go:204] [ 48655: 48655] Signal 48655, PID: 48655, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.934803 949939 task_exit.go:204] [ 48655: 48655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.947487 949939 task_exit.go:204] [ 48655: 48655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.947638 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:33.949431 949939 task_exit.go:204] [ 48655: 48655] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:33 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0xf, &(0x7f0000000100)={0x7fffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:33.955707 949939 usertrap_amd64.go:212] [ 48682: 48682] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:33.955859 949939 usertrap_amd64.go:122] [ 48682: 48682] Allocate a new trap: 0xc001a6e720 40 D0620 03:40:33.957174 949939 usertrap_amd64.go:225] [ 48682: 48682] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:33.960785 949939 usertrap_amd64.go:212] [ 48683: 48683] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:33.961017 949939 usertrap_amd64.go:122] [ 48683: 48683] Allocate a new trap: 0xc01f00f650 40 D0620 03:40:33.961895 949939 usertrap_amd64.go:212] [ 48684: 48684] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:33.962033 949939 usertrap_amd64.go:122] [ 48684: 48684] Allocate a new trap: 0xc00037f080 40 D0620 03:40:33.961994 949939 usertrap_amd64.go:225] [ 48683: 48683] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:33.962210 949939 usertrap_amd64.go:212] [ 48682: 48682] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:33.962524 949939 usertrap_amd64.go:122] [ 48682: 48682] Allocate a new trap: 0xc001a6e720 41 D0620 03:40:33.962742 949939 usertrap_amd64.go:225] [ 48682: 48682] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:33.962767 949939 usertrap_amd64.go:225] [ 48684: 48684] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:33.965580 949939 usertrap_amd64.go:212] [ 48683: 48683] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:33.965655 949939 usertrap_amd64.go:122] [ 48683: 48683] Allocate a new trap: 0xc01f00f650 41 D0620 03:40:33.965729 949939 usertrap_amd64.go:225] [ 48683: 48683] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:33.967269 949939 usertrap_amd64.go:212] [ 48684: 48684] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:33.967379 949939 usertrap_amd64.go:122] [ 48684: 48684] Allocate a new trap: 0xc00037f080 41 D0620 03:40:33.967455 949939 usertrap_amd64.go:225] [ 48684: 48684] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:33.978311 949939 usertrap_amd64.go:212] [ 48682: 48682] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:33.978404 949939 usertrap_amd64.go:122] [ 48682: 48682] Allocate a new trap: 0xc001a6e720 42 D0620 03:40:33.978516 949939 usertrap_amd64.go:225] [ 48682: 48682] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:33.985813 949939 usertrap_amd64.go:212] [ 48683: 48683] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:33.985915 949939 usertrap_amd64.go:122] [ 48683: 48683] Allocate a new trap: 0xc01f00f650 42 D0620 03:40:33.986020 949939 usertrap_amd64.go:225] [ 48683: 48683] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:33.988623 949939 usertrap_amd64.go:212] [ 48682: 48682] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:33.988727 949939 usertrap_amd64.go:122] [ 48682: 48682] Allocate a new trap: 0xc001a6e720 43 D0620 03:40:33.988856 949939 usertrap_amd64.go:225] [ 48682: 48682] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:33.992042 949939 usertrap_amd64.go:212] [ 48685: 48685] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:33.992155 949939 usertrap_amd64.go:122] [ 48685: 48685] Allocate a new trap: 0xc003084ab0 40 D0620 03:40:33.992729 949939 usertrap_amd64.go:225] [ 48685: 48685] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:33.992886 949939 task_exit.go:204] [ 48682: 48682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.993090 949939 task_signals.go:204] [ 48682: 48686] Signal 48682, PID: 48686, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:33.993619 949939 task_exit.go:204] [ 48682: 48682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:33.993941 949939 task_exit.go:204] [ 48682: 48686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:33.997428 949939 usertrap_amd64.go:212] [ 48684: 48684] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:33.997542 949939 usertrap_amd64.go:122] [ 48684: 48684] Allocate a new trap: 0xc00037f080 42 D0620 03:40:33.997650 949939 usertrap_amd64.go:225] [ 48684: 48684] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:34.000599 949939 usertrap_amd64.go:212] [ 48685: 48685] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:34.000674 949939 usertrap_amd64.go:122] [ 48685: 48685] Allocate a new trap: 0xc003084ab0 41 D0620 03:40:34.000730 949939 usertrap_amd64.go:225] [ 48685: 48685] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:34.001217 949939 task_exit.go:204] [ 48682: 48686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.001303 949939 task_exit.go:204] [ 48682: 48686] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.001374 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:34.008840 949939 task_exit.go:204] [ 48682: 48682] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:34 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0xa8100, 0xc4) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setrlimit(0xc, &(0x7f0000000180)={0x6a17, 0x1}) (async) setrlimit(0xc, &(0x7f0000000180)={0x6a17, 0x1}) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200), &(0x7f00000001c0), 0x2, 0x1) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:34.102036 949939 usertrap_amd64.go:212] [ 48690: 48690] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:34.102175 949939 usertrap_amd64.go:122] [ 48690: 48690] Allocate a new trap: 0xc009c87020 40 D0620 03:40:34.103543 949939 usertrap_amd64.go:225] [ 48690: 48690] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:34.107071 949939 usertrap_amd64.go:212] [ 48690: 48690] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:34.107205 949939 usertrap_amd64.go:122] [ 48690: 48690] Allocate a new trap: 0xc009c87020 41 D0620 03:40:34.107311 949939 usertrap_amd64.go:225] [ 48690: 48690] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:34.110428 949939 usertrap_amd64.go:212] [ 48685: 48685] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:34.110608 949939 usertrap_amd64.go:122] [ 48685: 48685] Allocate a new trap: 0xc003084ab0 42 D0620 03:40:34.110838 949939 usertrap_amd64.go:225] [ 48685: 48685] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:34.123542 949939 task_signals.go:470] [ 48685: 48694] Notified of signal 25 D0620 03:40:34.123858 949939 task_signals.go:204] [ 48685: 48694] Signal 48685, PID: 48694, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:34.124087 949939 task_exit.go:204] [ 48685: 48694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.124319 949939 task_signals.go:204] [ 48685: 48692] Signal 48685, PID: 48692, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.124350 949939 task_signals.go:204] [ 48685: 48691] Signal 48685, PID: 48691, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.124470 949939 task_exit.go:204] [ 48685: 48691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.124668 949939 task_exit.go:204] [ 48685: 48691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.124737 949939 task_exit.go:204] [ 48685: 48691] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.125078 949939 task_exit.go:204] [ 48685: 48694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.125175 949939 task_exit.go:204] [ 48685: 48694] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.125298 949939 task_exit.go:204] [ 48685: 48692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.125485 949939 task_exit.go:204] [ 48685: 48692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.125557 949939 task_exit.go:204] [ 48685: 48692] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.126251 949939 task_signals.go:204] [ 48685: 48685] Signal 48685, PID: 48685, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.126365 949939 task_exit.go:204] [ 48685: 48685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.132747 949939 task_exit.go:204] [ 48685: 48685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.133106 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:34.134168 949939 usertrap_amd64.go:212] [ 48690: 48690] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:34.134262 949939 usertrap_amd64.go:122] [ 48690: 48690] Allocate a new trap: 0xc009c87020 42 D0620 03:40:34.134402 949939 usertrap_amd64.go:225] [ 48690: 48690] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:34.135009 949939 task_exit.go:204] [ 48685: 48685] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:34 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x185002, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x10, 0x0, 0x21d42a8a) utime(&(0x7f00000000c0)='./file1\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40080, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000240)={0x0, 0x0, "cb4ff80aba57723776579d6f4b93486eb848aff49ee964a89965bc0730ad91ab34d06c593b83a893ca49d3888b49e86e6c2550a6c52a3a0a2331ce808836c4fe933ce3b8c3c33c7948c0caa90bc71ea0360e884ea702222e1aef2410d71fd2c083e52662eb015e0c5eeb0ff103a3fee5f7984a0c1fd7184caee0fbfa3ccf18700e3978f1b1ba4bfc958b8ee880e14eb33e9d4e28aa4a665b00aac91085d3122e1becb6ccf84ac53b4186cf873e2ec5167ebf09aa096a8cb20fbaac93822dd5bc19f71791de7615c694c456cfc65e1045a40356402ee3d1772f4fe3a169c21cc4ad0efbf46bf31475508d74426c5b387fbe3665f6bd327e2d9387ebd045996338", "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"}) ioctl$FIONCLEX(r1, 0x5450) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)={0x0, @aes128}) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:34.149052 949939 usertrap_amd64.go:212] [ 48684: 48684] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:34.149327 949939 usertrap_amd64.go:122] [ 48684: 48684] Allocate a new trap: 0xc00037f080 43 D0620 03:40:34.149528 949939 usertrap_amd64.go:225] [ 48684: 48684] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:34.309292 949939 usertrap_amd64.go:212] [ 48690: 48690] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:34.309402 949939 usertrap_amd64.go:122] [ 48690: 48690] Allocate a new trap: 0xc009c87020 43 D0620 03:40:34.309514 949939 usertrap_amd64.go:225] [ 48690: 48690] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:34.314557 949939 usertrap_amd64.go:212] [ 48683: 48683] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:34.314644 949939 usertrap_amd64.go:122] [ 48683: 48683] Allocate a new trap: 0xc01f00f650 43 D0620 03:40:34.314708 949939 usertrap_amd64.go:225] [ 48683: 48683] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:34.503105 949939 usertrap_amd64.go:212] [ 48690: 48690] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:34.503260 949939 usertrap_amd64.go:122] [ 48690: 48690] Allocate a new trap: 0xc009c87020 44 D0620 03:40:34.503352 949939 usertrap_amd64.go:225] [ 48690: 48690] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:34.503680 949939 usertrap_amd64.go:212] [ 48683: 48683] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:34.503825 949939 usertrap_amd64.go:122] [ 48683: 48683] Allocate a new trap: 0xc01f00f650 44 D0620 03:40:34.503939 949939 usertrap_amd64.go:225] [ 48683: 48683] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:34.511271 949939 task_exit.go:204] [ 48690: 48690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.511656 949939 task_signals.go:204] [ 48690: 48697] Signal 48690, PID: 48697, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.511960 949939 task_signals.go:204] [ 48690: 48701] Signal 48690, PID: 48701, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.511928 949939 task_signals.go:204] [ 48690: 48695] Signal 48690, PID: 48695, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.512166 949939 task_exit.go:204] [ 48690: 48695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.512465 949939 task_exit.go:204] [ 48690: 48695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.512561 949939 task_exit.go:204] [ 48690: 48695] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.512703 949939 task_signals.go:204] [ 48683: 48704] Signal 48683, PID: 48704, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.512718 949939 task_signals.go:204] [ 48683: 48687] Signal 48683, PID: 48687, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.512725 949939 task_signals.go:204] [ 48683: 48703] Signal 48683, PID: 48703, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.512834 949939 task_exit.go:204] [ 48683: 48704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.512802 949939 task_signals.go:204] [ 48683: 48700] Signal 48683, PID: 48700, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.512901 949939 task_signals.go:204] [ 48683: 48693] Signal 48683, PID: 48693, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.512921 949939 task_exit.go:204] [ 48690: 48690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.513127 949939 task_signals.go:204] [ 48683: 48699] Signal 48683, PID: 48699, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.513231 949939 task_signals.go:204] [ 48683: 48702] Signal 48683, PID: 48702, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.513376 949939 task_exit.go:204] [ 48683: 48699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.513470 949939 task_signals.go:204] [ 48683: 48696] Signal 48683, PID: 48696, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.513623 949939 task_exit.go:204] [ 48683: 48699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.513716 949939 task_exit.go:204] [ 48683: 48699] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.514021 949939 task_exit.go:204] [ 48683: 48687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.514228 949939 task_exit.go:204] [ 48683: 48687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.514272 949939 task_exit.go:204] [ 48683: 48687] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.514430 949939 task_exit.go:204] [ 48683: 48702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.514575 949939 task_exit.go:204] [ 48683: 48702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.514617 949939 task_exit.go:204] [ 48683: 48702] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.514721 949939 task_exit.go:204] [ 48683: 48683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.514805 949939 task_exit.go:204] [ 48690: 48697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.514867 949939 task_exit.go:204] [ 48690: 48701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.514969 949939 task_exit.go:204] [ 48683: 48703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.515225 949939 task_exit.go:204] [ 48683: 48700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.515347 949939 task_exit.go:204] [ 48683: 48693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.515957 949939 task_exit.go:204] [ 48683: 48696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.516663 949939 task_exit.go:204] [ 48683: 48700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.516766 949939 task_exit.go:204] [ 48683: 48700] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.516998 949939 task_exit.go:204] [ 48683: 48703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.517055 949939 task_exit.go:204] [ 48683: 48703] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.518456 949939 task_exit.go:204] [ 48690: 48697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.518638 949939 task_exit.go:204] [ 48690: 48697] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.518860 949939 task_exit.go:204] [ 48683: 48704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.518979 949939 task_exit.go:204] [ 48683: 48704] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.519147 949939 task_exit.go:204] [ 48683: 48683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.519319 949939 task_exit.go:204] [ 48683: 48693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.519421 949939 task_exit.go:204] [ 48683: 48693] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.524899 949939 task_exit.go:204] [ 48690: 48701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.525089 949939 task_exit.go:204] [ 48690: 48701] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.525193 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:34.526125 949939 task_exit.go:204] [ 48690: 48690] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:34 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0xa8100, 0xc4) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setrlimit(0xc, &(0x7f0000000180)={0x6a17, 0x1}) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200), &(0x7f00000001c0), 0x2, 0x1) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:34.527852 949939 task_exit.go:204] [ 48683: 48696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.527957 949939 task_exit.go:204] [ 48683: 48696] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.528055 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:34.528208 949939 task_exit.go:204] [ 48683: 48683] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:34 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0x3, &(0x7f0000000240)={0x0, 0x6}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) readlinkat(r1, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=""/137, 0x89) D0620 03:40:34.602358 949939 usertrap_amd64.go:212] [ 48705: 48705] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:34.602608 949939 usertrap_amd64.go:122] [ 48705: 48705] Allocate a new trap: 0xc009a00db0 40 D0620 03:40:34.603608 949939 usertrap_amd64.go:225] [ 48705: 48705] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:34.607029 949939 usertrap_amd64.go:212] [ 48705: 48705] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:34.607157 949939 usertrap_amd64.go:122] [ 48705: 48705] Allocate a new trap: 0xc009a00db0 41 D0620 03:40:34.607234 949939 usertrap_amd64.go:225] [ 48705: 48705] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:34.629849 949939 usertrap_amd64.go:212] [ 48706: 48706] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:34.629958 949939 usertrap_amd64.go:122] [ 48706: 48706] Allocate a new trap: 0xc004592720 40 D0620 03:40:34.630819 949939 usertrap_amd64.go:225] [ 48706: 48706] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:34.635819 949939 usertrap_amd64.go:212] [ 48706: 48706] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:34.635924 949939 usertrap_amd64.go:122] [ 48706: 48706] Allocate a new trap: 0xc004592720 41 D0620 03:40:34.636038 949939 usertrap_amd64.go:225] [ 48706: 48706] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:34.643703 949939 usertrap_amd64.go:212] [ 48705: 48705] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:34.643775 949939 usertrap_amd64.go:122] [ 48705: 48705] Allocate a new trap: 0xc009a00db0 42 D0620 03:40:34.643857 949939 usertrap_amd64.go:225] [ 48705: 48705] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:34.646507 949939 usertrap_amd64.go:212] [ 48707: 48707] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:34.646579 949939 usertrap_amd64.go:122] [ 48707: 48707] Allocate a new trap: 0xc014b20750 40 D0620 03:40:34.647760 949939 usertrap_amd64.go:225] [ 48707: 48707] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:34.651184 949939 usertrap_amd64.go:212] [ 48707: 48707] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:34.651286 949939 usertrap_amd64.go:122] [ 48707: 48707] Allocate a new trap: 0xc014b20750 41 D0620 03:40:34.651362 949939 usertrap_amd64.go:225] [ 48707: 48707] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:34.665938 949939 usertrap_amd64.go:212] [ 48705: 48705] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:34.666070 949939 usertrap_amd64.go:122] [ 48705: 48705] Allocate a new trap: 0xc009a00db0 43 D0620 03:40:34.666144 949939 usertrap_amd64.go:225] [ 48705: 48705] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:34.670436 949939 usertrap_amd64.go:212] [ 48706: 48706] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:34.670564 949939 usertrap_amd64.go:122] [ 48706: 48706] Allocate a new trap: 0xc004592720 42 D0620 03:40:34.670730 949939 usertrap_amd64.go:225] [ 48706: 48706] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:34.674743 949939 usertrap_amd64.go:212] [ 48707: 48707] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:34.674921 949939 usertrap_amd64.go:122] [ 48707: 48707] Allocate a new trap: 0xc014b20750 42 D0620 03:40:34.675017 949939 usertrap_amd64.go:225] [ 48707: 48707] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:34.676098 949939 task_exit.go:204] [ 48705: 48705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.676535 949939 task_exit.go:204] [ 48705: 48705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.676810 949939 task_signals.go:204] [ 48705: 48708] Signal 48705, PID: 48708, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.677017 949939 task_exit.go:204] [ 48705: 48708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.684451 949939 task_exit.go:204] [ 48705: 48708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.684536 949939 task_exit.go:204] [ 48705: 48708] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.684628 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:34.684740 949939 task_exit.go:204] [ 48705: 48705] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:34 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x185002, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x10, 0x0, 0x21d42a8a) (rerun: 64) utime(&(0x7f00000000c0)='./file1\x00', 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async, rerun: 64) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40080, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000240)={0x0, 0x0, "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", "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"}) (async) ioctl$FIONCLEX(r1, 0x5450) (async) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)={0x0, @aes128}) (async) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:34.788910 949939 usertrap_amd64.go:212] [ 48706: 48706] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:34.789074 949939 usertrap_amd64.go:122] [ 48706: 48706] Allocate a new trap: 0xc004592720 43 D0620 03:40:34.789138 949939 usertrap_amd64.go:225] [ 48706: 48706] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:34.802103 949939 usertrap_amd64.go:212] [ 48707: 48707] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:34.802216 949939 usertrap_amd64.go:122] [ 48707: 48707] Allocate a new trap: 0xc014b20750 43 D0620 03:40:34.802318 949939 usertrap_amd64.go:225] [ 48707: 48707] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:34.819206 949939 usertrap_amd64.go:212] [ 48684: 48684] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:34.819398 949939 usertrap_amd64.go:122] [ 48684: 48684] Allocate a new trap: 0xc00037f080 44 D0620 03:40:34.819532 949939 usertrap_amd64.go:225] [ 48684: 48684] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:34.824279 949939 task_exit.go:204] [ 48684: 48684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.824692 949939 task_signals.go:204] [ 48684: 48698] Signal 48684, PID: 48698, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.824710 949939 task_signals.go:204] [ 48684: 48688] Signal 48684, PID: 48688, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.824870 949939 task_exit.go:204] [ 48684: 48684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.825222 949939 task_exit.go:204] [ 48684: 48698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.825401 949939 task_signals.go:204] [ 48684: 48689] Signal 48684, PID: 48689, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:34.825490 949939 task_exit.go:204] [ 48684: 48698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.825539 949939 task_exit.go:204] [ 48684: 48698] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.825625 949939 task_exit.go:204] [ 48684: 48688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.825811 949939 task_exit.go:204] [ 48684: 48689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:34.826064 949939 task_exit.go:204] [ 48684: 48689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.826110 949939 task_exit.go:204] [ 48684: 48689] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.831072 949939 task_exit.go:204] [ 48684: 48688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:34.831134 949939 task_exit.go:204] [ 48684: 48688] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:34.831208 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:34.831530 949939 task_exit.go:204] [ 48684: 48684] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) r3 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) r4 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r4, 0x5450) dup3(r3, r4, 0x80000) D0620 03:40:35.118108 949939 usertrap_amd64.go:212] [ 48707: 48707] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:35.118220 949939 usertrap_amd64.go:122] [ 48707: 48707] Allocate a new trap: 0xc014b20750 44 D0620 03:40:35.118226 949939 usertrap_amd64.go:212] [ 48706: 48706] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:35.118322 949939 usertrap_amd64.go:225] [ 48707: 48707] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:35.118347 949939 usertrap_amd64.go:122] [ 48706: 48706] Allocate a new trap: 0xc004592720 44 D0620 03:40:35.118434 949939 usertrap_amd64.go:225] [ 48706: 48706] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:35.126531 949939 task_exit.go:204] [ 48707: 48707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.126859 949939 task_exit.go:204] [ 48707: 48707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.127003 949939 task_exit.go:204] [ 48706: 48706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.127162 949939 task_signals.go:204] [ 48707: 48713] Signal 48707, PID: 48713, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127393 949939 task_signals.go:204] [ 48707: 48714] Signal 48707, PID: 48714, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127424 949939 task_signals.go:204] [ 48706: 48718] Signal 48706, PID: 48718, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127434 949939 task_signals.go:204] [ 48707: 48712] Signal 48707, PID: 48712, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127538 949939 task_signals.go:204] [ 48706: 48711] Signal 48706, PID: 48711, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127538 949939 task_signals.go:204] [ 48706: 48717] Signal 48706, PID: 48717, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127682 949939 task_signals.go:204] [ 48706: 48710] Signal 48706, PID: 48710, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127730 949939 task_exit.go:204] [ 48706: 48717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.127700 949939 task_signals.go:204] [ 48707: 48716] Signal 48707, PID: 48716, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.127939 949939 task_signals.go:204] [ 48706: 48709] Signal 48706, PID: 48709, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.128024 949939 task_exit.go:204] [ 48707: 48716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.128196 949939 task_signals.go:204] [ 48706: 48715] Signal 48706, PID: 48715, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.128376 949939 task_exit.go:204] [ 48707: 48716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.128440 949939 task_exit.go:204] [ 48707: 48716] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.128573 949939 task_exit.go:204] [ 48707: 48714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.128811 949939 task_exit.go:204] [ 48707: 48714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.128882 949939 task_exit.go:204] [ 48707: 48714] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.129033 949939 task_exit.go:204] [ 48706: 48710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.129269 949939 task_exit.go:204] [ 48706: 48718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.129527 949939 task_exit.go:204] [ 48706: 48718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.129587 949939 task_exit.go:204] [ 48706: 48718] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.129747 949939 task_exit.go:204] [ 48707: 48712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.129979 949939 task_exit.go:204] [ 48707: 48712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.130060 949939 task_exit.go:204] [ 48707: 48712] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.130324 949939 task_exit.go:204] [ 48707: 48713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.130504 949939 task_exit.go:204] [ 48706: 48711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.130704 949939 task_exit.go:204] [ 48706: 48709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.130834 949939 task_exit.go:204] [ 48706: 48715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.130927 949939 task_exit.go:204] [ 48706: 48706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.131064 949939 task_exit.go:204] [ 48706: 48717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.131177 949939 task_exit.go:204] [ 48706: 48717] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.131368 949939 task_exit.go:204] [ 48706: 48711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.131496 949939 task_exit.go:204] [ 48706: 48711] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.131809 949939 task_exit.go:204] [ 48706: 48709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.131879 949939 task_exit.go:204] [ 48706: 48709] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.132048 949939 task_exit.go:204] [ 48706: 48710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.132107 949939 task_exit.go:204] [ 48706: 48710] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.138039 949939 task_exit.go:204] [ 48707: 48713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.138123 949939 task_exit.go:204] [ 48707: 48713] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.138262 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:35.138688 949939 task_exit.go:204] [ 48707: 48707] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.139740 949939 task_exit.go:204] [ 48706: 48715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.139835 949939 task_exit.go:204] [ 48706: 48715] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.139969 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:35.140079 949939 task_exit.go:204] [ 48706: 48706] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:35 executing program 3: r0 = open(&(0x7f0000000140)='./file0/file1\x00', 0x109242, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:35.141801 949939 usertrap_amd64.go:212] [ 48719: 48719] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:35.141955 949939 usertrap_amd64.go:122] [ 48719: 48719] Allocate a new trap: 0xc0045928d0 40 D0620 03:40:35.142555 949939 usertrap_amd64.go:225] [ 48719: 48719] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) 03:40:35 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000002c0)=@get={0x1, &(0x7f0000000280)=""/22, 0x7a0a}) ioctl$FIONCLEX(r1, 0x5450) mknodat$loop(r0, &(0x7f0000000180)='./file0/file1\x00', 0x20, 0x0) close_range(r1, r0, 0x2) utime(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x23002, 0xa2) faccessat2(r2, &(0x7f0000000140)='./file0/file1\x00', 0x7, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x202220, 0x0) fcntl$addseals(r3, 0x409, 0x2) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x80000000) D0620 03:40:35.146064 949939 usertrap_amd64.go:212] [ 48719: 48719] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:35.146136 949939 usertrap_amd64.go:122] [ 48719: 48719] Allocate a new trap: 0xc0045928d0 41 D0620 03:40:35.146221 949939 usertrap_amd64.go:225] [ 48719: 48719] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:35.209995 949939 usertrap_amd64.go:212] [ 48720: 48720] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:35.210169 949939 usertrap_amd64.go:122] [ 48720: 48720] Allocate a new trap: 0xc000d0ad80 40 D0620 03:40:35.211053 949939 usertrap_amd64.go:225] [ 48720: 48720] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:35.214348 949939 usertrap_amd64.go:212] [ 48720: 48720] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:35.214468 949939 usertrap_amd64.go:122] [ 48720: 48720] Allocate a new trap: 0xc000d0ad80 41 D0620 03:40:35.214566 949939 usertrap_amd64.go:225] [ 48720: 48720] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:35.224837 949939 usertrap_amd64.go:212] [ 48719: 48719] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:35.225019 949939 usertrap_amd64.go:122] [ 48719: 48719] Allocate a new trap: 0xc0045928d0 42 D0620 03:40:35.225104 949939 usertrap_amd64.go:225] [ 48719: 48719] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:35.226390 949939 usertrap_amd64.go:212] [ 48721: 48721] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:35.226498 949939 usertrap_amd64.go:122] [ 48721: 48721] Allocate a new trap: 0xc000d0ae10 40 D0620 03:40:35.227242 949939 usertrap_amd64.go:225] [ 48721: 48721] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:35.234641 949939 usertrap_amd64.go:212] [ 48721: 48721] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:35.234763 949939 usertrap_amd64.go:122] [ 48721: 48721] Allocate a new trap: 0xc000d0ae10 41 D0620 03:40:35.234864 949939 usertrap_amd64.go:225] [ 48721: 48721] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:35.237083 949939 usertrap_amd64.go:212] [ 48722: 48722] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:35.237214 949939 usertrap_amd64.go:122] [ 48722: 48722] Allocate a new trap: 0xc001a6e9c0 40 D0620 03:40:35.238216 949939 usertrap_amd64.go:225] [ 48722: 48722] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:35.244727 949939 usertrap_amd64.go:212] [ 48722: 48722] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:35.244798 949939 usertrap_amd64.go:122] [ 48722: 48722] Allocate a new trap: 0xc001a6e9c0 41 D0620 03:40:35.244874 949939 usertrap_amd64.go:225] [ 48722: 48722] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:35.245816 949939 usertrap_amd64.go:212] [ 48719: 48719] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:35.245987 949939 usertrap_amd64.go:122] [ 48719: 48719] Allocate a new trap: 0xc0045928d0 43 D0620 03:40:35.246116 949939 usertrap_amd64.go:225] [ 48719: 48719] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:35.248611 949939 usertrap_amd64.go:212] [ 48720: 48720] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:35.248850 949939 usertrap_amd64.go:122] [ 48720: 48720] Allocate a new trap: 0xc000d0ad80 42 D0620 03:40:35.249104 949939 usertrap_amd64.go:225] [ 48720: 48720] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:35.264335 949939 usertrap_amd64.go:212] [ 48722: 48722] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:35.264427 949939 usertrap_amd64.go:122] [ 48722: 48722] Allocate a new trap: 0xc001a6e9c0 42 D0620 03:40:35.264499 949939 usertrap_amd64.go:225] [ 48722: 48722] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:35.270628 949939 usertrap_amd64.go:212] [ 48719: 48719] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:35.270705 949939 usertrap_amd64.go:122] [ 48719: 48719] Allocate a new trap: 0xc0045928d0 44 D0620 03:40:35.270783 949939 usertrap_amd64.go:225] [ 48719: 48719] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:35.273108 949939 usertrap_amd64.go:212] [ 48721: 48721] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:35.273207 949939 usertrap_amd64.go:122] [ 48721: 48721] Allocate a new trap: 0xc000d0ae10 42 D0620 03:40:35.273265 949939 usertrap_amd64.go:225] [ 48721: 48721] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:35.275734 949939 task_signals.go:470] [ 48722: 48728] Notified of signal 25 D0620 03:40:35.275822 949939 task_signals.go:204] [ 48722: 48728] Signal 48722, PID: 48728, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:35.275895 949939 task_exit.go:204] [ 48722: 48728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.276053 949939 task_exit.go:204] [ 48722: 48728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.276096 949939 task_exit.go:204] [ 48722: 48728] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.276228 949939 task_signals.go:204] [ 48722: 48722] Signal 48722, PID: 48722, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.276340 949939 task_exit.go:204] [ 48722: 48722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.281143 949939 task_exit.go:204] [ 48722: 48722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.281359 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:35.281384 949939 usertrap_amd64.go:212] [ 48721: 48721] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:35.281481 949939 usertrap_amd64.go:122] [ 48721: 48721] Allocate a new trap: 0xc000d0ae10 43 D0620 03:40:35.281567 949939 usertrap_amd64.go:225] [ 48721: 48721] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:35.281820 949939 task_exit.go:204] [ 48722: 48722] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:35 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000002c0)=@get={0x1, &(0x7f0000000280)=""/22, 0x7a0a}) ioctl$FIONCLEX(r1, 0x5450) mknodat$loop(r0, &(0x7f0000000180)='./file0/file1\x00', 0x20, 0x0) (async) mknodat$loop(r0, &(0x7f0000000180)='./file0/file1\x00', 0x20, 0x0) close_range(r1, r0, 0x2) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x23002, 0xa2) (async) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x23002, 0xa2) faccessat2(r2, &(0x7f0000000140)='./file0/file1\x00', 0x7, 0x0) (async) faccessat2(r2, &(0x7f0000000140)='./file0/file1\x00', 0x7, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x202220, 0x0) fcntl$addseals(r3, 0x409, 0x2) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x80000000) D0620 03:40:35.287936 949939 task_exit.go:204] [ 48719: 48719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.288088 949939 task_signals.go:204] [ 48719: 48725] Signal 48719, PID: 48725, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.288166 949939 task_exit.go:204] [ 48719: 48725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.288247 949939 task_signals.go:204] [ 48719: 48723] Signal 48719, PID: 48723, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.288280 949939 task_exit.go:204] [ 48719: 48719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.288368 949939 task_signals.go:204] [ 48719: 48726] Signal 48719, PID: 48726, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.288067 949939 task_signals.go:204] [ 48719: 48724] Signal 48719, PID: 48724, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.288459 949939 task_exit.go:204] [ 48719: 48726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.288565 949939 task_exit.go:204] [ 48719: 48724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.288747 949939 task_exit.go:204] [ 48719: 48724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.288805 949939 task_exit.go:204] [ 48719: 48724] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.289054 949939 task_exit.go:204] [ 48719: 48726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.289128 949939 task_exit.go:204] [ 48719: 48726] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.289272 949939 task_exit.go:204] [ 48719: 48723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.289582 949939 task_exit.go:204] [ 48719: 48725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.289851 949939 task_exit.go:204] [ 48719: 48725] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.290279 949939 task_exit.go:204] [ 48721: 48721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.290514 949939 task_exit.go:204] [ 48721: 48721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.290656 949939 task_signals.go:204] [ 48721: 48729] Signal 48721, PID: 48729, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.290751 949939 task_exit.go:204] [ 48721: 48729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.296582 949939 task_exit.go:204] [ 48721: 48729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.296661 949939 task_exit.go:204] [ 48721: 48729] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.296734 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:35.297406 949939 task_exit.go:204] [ 48721: 48721] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:35 executing program 3: r0 = open(&(0x7f0000000140)='./file0/file1\x00', 0x109242, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:35.305885 949939 usertrap_amd64.go:212] [ 48730: 48730] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:35.305984 949939 usertrap_amd64.go:122] [ 48730: 48730] Allocate a new trap: 0xc0093af2c0 40 D0620 03:40:35.306717 949939 usertrap_amd64.go:225] [ 48730: 48730] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:35.310682 949939 usertrap_amd64.go:212] [ 48730: 48730] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:35.310807 949939 usertrap_amd64.go:122] [ 48730: 48730] Allocate a new trap: 0xc0093af2c0 41 D0620 03:40:35.310885 949939 usertrap_amd64.go:225] [ 48730: 48730] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:35.327904 949939 task_exit.go:204] [ 48719: 48723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.328002 949939 task_exit.go:204] [ 48719: 48723] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.328129 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:35.328787 949939 task_exit.go:204] [ 48719: 48719] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.329927 949939 usertrap_amd64.go:212] [ 48730: 48730] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:35.329995 949939 usertrap_amd64.go:122] [ 48730: 48730] Allocate a new trap: 0xc0093af2c0 42 D0620 03:40:35.330098 949939 usertrap_amd64.go:225] [ 48730: 48730] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) 03:40:35 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x185002, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x10, 0x0, 0x21d42a8a) utime(&(0x7f00000000c0)='./file1\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40080, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000240)={0x0, 0x0, "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", "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"}) ioctl$FIONCLEX(r1, 0x5450) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)={0x0, @aes128}) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x185002, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x10, 0x0, 0x21d42a8a) (async) utime(&(0x7f00000000c0)='./file1\x00', 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40080, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000240)={0x0, 0x0, "cb4ff80aba57723776579d6f4b93486eb848aff49ee964a89965bc0730ad91ab34d06c593b83a893ca49d3888b49e86e6c2550a6c52a3a0a2331ce808836c4fe933ce3b8c3c33c7948c0caa90bc71ea0360e884ea702222e1aef2410d71fd2c083e52662eb015e0c5eeb0ff103a3fee5f7984a0c1fd7184caee0fbfa3ccf18700e3978f1b1ba4bfc958b8ee880e14eb33e9d4e28aa4a665b00aac91085d3122e1becb6ccf84ac53b4186cf873e2ec5167ebf09aa096a8cb20fbaac93822dd5bc19f71791de7615c694c456cfc65e1045a40356402ee3d1772f4fe3a169c21cc4ad0efbf46bf31475508d74426c5b387fbe3665f6bd327e2d9387ebd045996338", "e4eda9e7fe08058e8d107f268678cae619220c091aff4f644ad1f2743052b2948386f494c5470ad985b3b373687d8a00cd815f2b9141e09e8ee0ce305b99e96bc39d15f8880cea6a248983f2c019d5ec6d6d42ed0a273467020d23a7abc8889ed24c56fe2e1409438ab41a89e59b3770e2c44bba8e68a0c0bcee779357d64d5db9081e4dae7751794e0514553abb69bdabc2f3130f2c000106a590f6db2aa6b7422ca8d71be86e3a05a1ee4082e3f3a4c8fb8793c353f90e3650ccb3d22a7e664962b90c354122e9813a9a4f666d236cfe66854dfd8d67a84e5c73b6d27f2f44d6c50ba9f7a5701ac6d5f08eaa37424599e1dd1e2247cc5dcacaefe1beb281954731e5163277a348d4d19e9561a2f2bbfe4dfbd05c579ef3f18c11bc8530e42a85f0df8aa28008f495f764b645d462921e5e657c15e039a4026f595334881e981b605fc2845024389d0ccee74ad082a2b8753b90a32a2f5d2834d3bcbe0f12e0a6c5e07a6462c4a3b295569160f4777c3cbcb0ff9793d011733746c5beb60890ab666cdf85d83c284b05d7e6007c26f423e4432871e045d20185ca13e9769e22816eff6d5bcff7aa0ccdc3302de9b2f45e454ed7f20b0d7f112573afc4670a568fca5994f1ae62eb12da4eb1ab6b758b86207a05bb153c1d2550520a5e9fe6141db9b281e2881b4f292faa27f46fce58ee212c67a9a26e80a09ae71fa997ed0e3de4a71960a816549bf98f06607ebc2c9fb2be9726ed2437cb02a65baf58b9839a7463c26521ae6dba509d56608887245968c156baf263a95e5714286454cf56fd1272dbcca3547c115da8d8126aee14564edf8c560b3bf57e36700613807d6690625c3998a9b9bc6ea85b593589f52b03b3cefa7ab3c70e75a50987e31288fb0231507646a16c56c426abae4248b7d5110a92fe206677cb091a36327fe9e8e99138dccb355b4a695c85778a2cbe630b90c35c0a948f36f9b82f756ff8b5888541b4437cebfb4e98342caf594afbd7ed1adb85e8fd926f1fd9896ea587f9c82e93a46e287d0d8e8b223aa68dc5c85d91d711ccc1aee38922f5b92686519b26118497f9475018dc74218edb69029d3bb60ac5776a6d59b74da567ac6130dfe5058e58bef3d949d6a57165520cc8d2c4b8e920c2604fcccafcca2d0770d690cd5ee96511b9fc2a0c2a7e4ee6bf5fa69a6838db30952298001f46013f678b93ff35463b651104f9540fc61cccd1a9053c7bb48c33b991369daa497f64e08a19b47a1be23d717a83a85c06d95b4f5b45a4a75968ad665680466fc61e7ae03761e0d23671cd164e449e14d8d7018103018ca15fccc97ff664b9739e2f4236993f9f09d1703ec16c5833e98e0ec1d5637032c542f1b3db10bc0dc2cf7bf16d0f528b835487ba0bc039baba24b0706e22aeedec12d7cddf09c2df9010ec4d8f0464eadeffd77e2890a68e96f0b9ea536f048f8456d36eec535d98ee9a943e9fd10df3ca80645a6919cf45c928f31958cca56a6b25095e7a081666fcf6c470b0acaee7e2719ba2a5e86b1bf42c7554fcdfa4e9bb7f16ccbb5b6aaaadc4666d90564db5d84cdff5903d39ec9b18d607a0e548c09ee804d38bff29311f126c787b2a6389d7f0174e98db3fa457fbe7d5c568113e0ee3dd38f763de2c06b41a02c0a42a9ca2b9cb437909abfc58cd6ff68c4a2575362016fe23228a391c4a48dd140280681d03bb056229af21271bf98977bf8e6aa2bd9f6bb9743367a88e9896a5e8ec6b35f69268f97c7d12d1e97b2a34b5c6289d8de686da713705c3d55be2f0580b987e25efa3023b532c3b1588767a4e67707ba25ce112b7c79f46c66528e308f889d0399a505ae7a1f5cd1a49ee889aa9fa0ea5064c58fb88ee1e539799a05195d3fe0f9332db8797a188379c5136780940bef33d5d5188728e11ad52fba69706b66e53785e1dd438dfcc3c9fcf702e9103bf9ec44962eaf5879102c537377fca4d4ff7a7f8add5d5cea2856478414eef1b73f7b2789e65a53c6e850357ab55356f2873f49634217008ab559bd962673f93d47de961651109ca42590dd682204a5bbc728528031d77990039161a871a3efc1ca937759798c65a6aa77fda139174098684fa10e63c1d906d82eae8f1eb8d93c49da3f9bf79c3ecd9ef635b619695995e0e5bfdd51e0f4cdd9bd6dce6f2e4acf74aee6f9967f5c6ca6a57be0fb9ed7141ebe01d4d6bebb02e55873b8c533abdcbc2ec756016f463c5480cb6fdda262c4e965f110d92b64313cfc405bc4f3e82e6d5dd733b9e6627b175842c559a63e83f957166edf717087eca98a66bab278b0d42c264b17a6d2779617a3fa17d225b8323f82d63312fbfb0851b1d04dce9357358552101c33cd2c467f61425ef35d28d0f9a57600a809969e3daff37503ff1ef3e40b0f29fcc1dcd11c32b30af1c17dfb3727a9f9ffea4e21860adbccae1e944c14611272c4e96ac6cb19245eaa316ec34f8cf50d63d1d56517c444325cf82ec64bdf273c46824458885aa8d1b872f4d90e01c026a761bba48e6f0a6870cccba750c7e1f5f582c962678ebde665a01b0b350519849881ce2c4f4ce7e9e248f2ee057999281d2933fc7eb2d2379bf6fb35e2be6f2de29c64c4172416cc402c3ba351c398245977a186eb2b45dc7e7bda7d679e0af8ecaa23c39ebff7abc0ade8a9c76841db4975dcee4f27cae6335f8c4a7921c4c52703a42c24f02da4a7831018a705029eb204e13471fbc6f9ab0e745078a31a99864c50961b82d8d2e2ff4c5cb6cebe0d3989247bcdf80963d07ae44689c5d852b7f99596de1345ac1b2dcb5a4fdd464942690a7a750982c871830e1ebb9f3e7fdfbf11c10e5f2e03406160e9eac9635f613aca259a8289a7995f7f6e1fbf114e4cd1379e062e811ccaf5bad36f2462e0b34b875c71f6911f1e3c83e409d109c96f95865ad4000051d6376abe728e7e95ea4f3c3629e075ff3a7ab1428f13ed5af12401629b0dc18b10c840c5657ea5fb5cb02b6b09cd3d7025d61d11532f25892917415ef4b98a64273de0896451347a455950d94f8fbb9682e4bca6bb9c4ef0864c6b2561f7fcfe92000bbb11df33341b635824f794ddd0076c7c7609c7de2e02f331ed74cdb0bad1c97bd227bc5cf0fc0153a8e8d0ec7f0166f89373159e3f7db175ce0624a2bbec914f007cd4dd8f252f8fad3ac82b27c1d3600add160069353d616c3c5557516bc8b88360dbab623cfc05813250be216069325a8f50da1b5907c907c58e079da6a85353691ee91e0019a253d0c92982ee38e0f20b091e52db017d1d574db33f2db27898451c43dea2da5c5174086eaa8334faaa3b779be277bfa4440a7e22d2f759310d11b65023ed358c89cd33df8a0e05915ed735a54d5d1854b9da1435be4ce18d7de945251b0be289a8eda2aff0043239158e7de5cd0c1385901627799ddf85c2c21044b46c29ca48e9d8443f88f59d35fe6970fd15c080376f590e511e0c331fce49a1ec3795a48a2d08ba9a2f26ac46d36022a5499b2fd4f258d08cbd2cea10b00bc4f0d7b54aafb4f5c11ad60b68ebc82231aa0482c95bb4ad686cd2aae1ec170fefb4c27e2661d358034ef26fe02931367b6521ae8d9221040b239120acc5f9194d6e03a47d7396ffdef1d8088afedd1941619107a5b07067167544b0a98320cf515250cbe58be226ea1624b23bc13437838c238db4ab5ab0a20bbf1bf41ee573aec6fd2d31e54ed69425bc2266b750bc22f49cf514d382b84e509a7fc8e900733a265888e464c6a06b2343eac0d5874ef30e94a0924d5db8ee0486277ef0bba40d13c00c3859af809c26a41890c851d5fdafa5802b3cd3e7a9df40513662ab7d0f6c59c5fbfb313c868e76f4295472ed6f2b154ee7037ee6931eb16d1725bb3494acfaa2ebf9147214671f91e980cc5c5ac58724107011ace2cfacd61713fd976565b577eafe43597b38744f1757f5deee1db7c5a003e6a108be20cbdbb250ed936c613302267b01f08a25082930490eb77cdbc51a4b89bba29ade79578b6ba1f6c096c09742fb48923e471820b46046cfba979e3d41b8477e3b81fd7acf220fd2e5b91f9345ddab6ed36c185e5eae464dba2ff4f649baccde21cc6475ca206f954104b6a778a45bd1d13ed360bae419819d016a0601cc1453aa50f653692a9392c1b17efcf3c166179897bb22292c233fff9b8fb07c641da36f2dfd599dda0826218ceb0cb50a17b733dd55f28539e1124cc9622aa5c5557244cb6871973db8028a3707c88fe121868322f3a62cb4291a61a90e288c1f4bfba2469554bba10110b6ef516d0a5855ec6bb53a1c157d6e948b3645af5a4751ba9934a75ee5a197cb15b36c4fdd1c914b37e4dd02bf227392ed079107f48f4b8eada71f18e94c0dff9f322674cf314ac678a637551fbdad4c0b53501c4bf053b564e9290437c4500b9228bdf01099bb9670ab6216bbf5ad75049446a1b459e8cf0ff408ee4767eba4416ead788d4999ceb63a476352d361d13648aa6717dfbad11681d866918a357bd258e6e5e828a63a886c8cc78790ae2fb64f761a57a46371c6b48bda079cdaea2d1ccd74ff52f8335f9184b4aa4a0d0cc326a1be9f6d486851b3a63ef2f874177ad5bdc6f1463078c62f9c3df8d620c6972ac9552638df260cba91e451c0c14cea7dd167d80cab729fcad75da681aeb0c6471a8e40e202352cbcfb9cc7927cdaee512230e096dde0218d6e0bc1c310c2e0649a6fceb3afb00ca4fc02cdf3c7108d8ff39a1c7693b2ae3f90afd53596c386c352a6867c141a735ebd4b52a7131301734e5e6f957b9c29a40080fa06a27db357d8b1d6b1a279b73c872467999909e637967d2cb64a62f4081d4927562f68700678e8f238ec249d3f81d2cef4da326806dffd525061f9183ea28cd6e859f003609628ae3f96e1bc75d74be9977383e8d5e2bbf8031336ddef02da784dda950a2203172fcc2129ffb4174ed509ef4e0179ce1a52fb4f1997252461131c8a0118e4dbbf8305a9dad9cc8305689c78e2781627bd168c5077bdc7dcbb107500b0d86a2e5dcbe5a01a909d147537beb7c03da143cf8858a9360282bf80d6a8a4c9a4507bc806360912bb9a0ef54989d59af9e83d1a50e04a32d2f04b28b6f70e28c99bb87fa9686245f933944c40e6465da2d8205cfeec588fcfad7ad2c8c14bae4947129895b14004c0d102e62291d1c8211f97b5ce77fcea5e844f3656eb2c7611774f9afc6844f81a0320f6952555be9aa67b481a4cff64cad49491807c40d595c8132bedb605d6e23132da5126e3ec18c160a6b269c6078d2e9c9341871c78282f779705e0d2233ae6cd5a4263e22bf3b7aa8050b98ae75447176a2246eb1596abe0e5fa1dcc65ab7f8bb5eb5"}) (async) ioctl$FIONCLEX(r1, 0x5450) (async) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)={0x0, @aes128}) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) D0620 03:40:35.338005 949939 task_signals.go:470] [ 48730: 48733] Notified of signal 25 D0620 03:40:35.338307 949939 task_signals.go:204] [ 48730: 48733] Signal 48730, PID: 48733, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:35.338447 949939 task_exit.go:204] [ 48730: 48733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.338588 949939 task_signals.go:204] [ 48730: 48730] Signal 48730, PID: 48730, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.338666 949939 task_exit.go:204] [ 48730: 48733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.338724 949939 task_exit.go:204] [ 48730: 48733] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.338897 949939 task_exit.go:204] [ 48730: 48730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.342658 949939 usertrap_amd64.go:212] [ 48731: 48731] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:35.342809 949939 usertrap_amd64.go:122] [ 48731: 48731] Allocate a new trap: 0xc004592c30 40 D0620 03:40:35.343441 949939 usertrap_amd64.go:225] [ 48731: 48731] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:35.343697 949939 usertrap_amd64.go:212] [ 48720: 48720] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:35.343863 949939 usertrap_amd64.go:122] [ 48720: 48720] Allocate a new trap: 0xc000d0ad80 43 D0620 03:40:35.344044 949939 usertrap_amd64.go:225] [ 48720: 48720] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:35.345130 949939 task_exit.go:204] [ 48730: 48730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.345207 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:35.346704 949939 task_exit.go:204] [ 48730: 48730] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.347242 949939 usertrap_amd64.go:212] [ 48731: 48731] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:35.347384 949939 usertrap_amd64.go:122] [ 48731: 48731] Allocate a new trap: 0xc004592c30 41 D0620 03:40:35.347473 949939 usertrap_amd64.go:225] [ 48731: 48731] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) 03:40:35 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000002c0)=@get={0x1, &(0x7f0000000280)=""/22, 0x7a0a}) (async) ioctl$FIONCLEX(r1, 0x5450) (async) mknodat$loop(r0, &(0x7f0000000180)='./file0/file1\x00', 0x20, 0x0) (async) close_range(r1, r0, 0x2) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x23002, 0xa2) faccessat2(r2, &(0x7f0000000140)='./file0/file1\x00', 0x7, 0x0) (async) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x202220, 0x0) fcntl$addseals(r3, 0x409, 0x2) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x80000000) D0620 03:40:35.368472 949939 usertrap_amd64.go:212] [ 48731: 48731] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:35.368601 949939 usertrap_amd64.go:122] [ 48731: 48731] Allocate a new trap: 0xc004592c30 42 D0620 03:40:35.368663 949939 usertrap_amd64.go:225] [ 48731: 48731] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:35.371076 949939 usertrap_amd64.go:212] [ 48734: 48734] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:35.371230 949939 usertrap_amd64.go:122] [ 48734: 48734] Allocate a new trap: 0xc0066f3770 40 D0620 03:40:35.371288 949939 usertrap_amd64.go:212] [ 48735: 48735] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:35.371416 949939 usertrap_amd64.go:122] [ 48735: 48735] Allocate a new trap: 0xc009a01170 40 D0620 03:40:35.371911 949939 usertrap_amd64.go:225] [ 48734: 48734] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:35.372139 949939 usertrap_amd64.go:225] [ 48735: 48735] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:35.376909 949939 usertrap_amd64.go:212] [ 48734: 48734] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:35.377066 949939 usertrap_amd64.go:122] [ 48734: 48734] Allocate a new trap: 0xc0066f3770 41 D0620 03:40:35.377213 949939 usertrap_amd64.go:225] [ 48734: 48734] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:35.377251 949939 usertrap_amd64.go:212] [ 48735: 48735] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:35.377437 949939 usertrap_amd64.go:122] [ 48735: 48735] Allocate a new trap: 0xc009a01170 41 D0620 03:40:35.377606 949939 usertrap_amd64.go:225] [ 48735: 48735] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:35.380491 949939 usertrap_amd64.go:212] [ 48731: 48731] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:35.380592 949939 usertrap_amd64.go:122] [ 48731: 48731] Allocate a new trap: 0xc004592c30 43 D0620 03:40:35.380697 949939 usertrap_amd64.go:225] [ 48731: 48731] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:35.393407 949939 task_exit.go:204] [ 48731: 48731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.393686 949939 task_exit.go:204] [ 48731: 48731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.393699 949939 task_signals.go:204] [ 48731: 48737] Signal 48731, PID: 48737, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.393886 949939 task_signals.go:204] [ 48731: 48736] Signal 48731, PID: 48736, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.393978 949939 task_exit.go:204] [ 48731: 48737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.393936 949939 task_signals.go:204] [ 48731: 48738] Signal 48731, PID: 48738, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.394172 949939 task_exit.go:204] [ 48731: 48738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.394512 949939 task_exit.go:204] [ 48731: 48736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.394979 949939 task_exit.go:204] [ 48731: 48738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.395097 949939 task_exit.go:204] [ 48731: 48738] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.395619 949939 task_exit.go:204] [ 48731: 48736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.395708 949939 task_exit.go:204] [ 48731: 48736] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.397232 949939 usertrap_amd64.go:212] [ 48734: 48734] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:35.397340 949939 usertrap_amd64.go:122] [ 48734: 48734] Allocate a new trap: 0xc0066f3770 42 D0620 03:40:35.401093 949939 usertrap_amd64.go:225] [ 48734: 48734] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:35.402267 949939 task_exit.go:204] [ 48731: 48737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.402378 949939 task_exit.go:204] [ 48731: 48737] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.402495 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:35.405103 949939 task_exit.go:204] [ 48731: 48731] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:35 executing program 3: r0 = open(&(0x7f0000000140)='./file0/file1\x00', 0x109242, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:35.416679 949939 usertrap_amd64.go:212] [ 48735: 48735] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:35.416793 949939 usertrap_amd64.go:122] [ 48735: 48735] Allocate a new trap: 0xc009a01170 42 D0620 03:40:35.416877 949939 usertrap_amd64.go:225] [ 48735: 48735] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:35.441811 949939 usertrap_amd64.go:212] [ 48734: 48734] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:35.441994 949939 usertrap_amd64.go:122] [ 48734: 48734] Allocate a new trap: 0xc0066f3770 43 D0620 03:40:35.442123 949939 usertrap_amd64.go:225] [ 48734: 48734] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:35.444767 949939 usertrap_amd64.go:212] [ 48734: 48734] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:35.444819 949939 usertrap_amd64.go:122] [ 48734: 48734] Allocate a new trap: 0xc0066f3770 44 D0620 03:40:35.445008 949939 usertrap_amd64.go:225] [ 48734: 48734] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:35.449047 949939 usertrap_amd64.go:212] [ 48741: 48741] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:35.449197 949939 usertrap_amd64.go:122] [ 48741: 48741] Allocate a new trap: 0xc009c87290 40 D0620 03:40:35.449888 949939 usertrap_amd64.go:225] [ 48741: 48741] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:35.450934 949939 task_exit.go:204] [ 48734: 48734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.451193 949939 task_exit.go:204] [ 48734: 48734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.451388 949939 task_signals.go:204] [ 48734: 48739] Signal 48734, PID: 48739, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.451482 949939 task_exit.go:204] [ 48734: 48739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.451386 949939 task_signals.go:204] [ 48734: 48743] Signal 48734, PID: 48743, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.451646 949939 task_exit.go:204] [ 48734: 48739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.451688 949939 task_exit.go:204] [ 48734: 48739] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.451840 949939 task_signals.go:204] [ 48734: 48742] Signal 48734, PID: 48742, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.451832 949939 task_signals.go:204] [ 48734: 48744] Signal 48734, PID: 48744, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.451928 949939 task_exit.go:204] [ 48734: 48742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.452095 949939 task_exit.go:204] [ 48734: 48744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.452316 949939 task_exit.go:204] [ 48734: 48743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.452708 949939 task_exit.go:204] [ 48734: 48744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.452795 949939 task_exit.go:204] [ 48734: 48744] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.453463 949939 task_exit.go:204] [ 48734: 48742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.453628 949939 task_exit.go:204] [ 48734: 48742] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.459111 949939 usertrap_amd64.go:212] [ 48741: 48741] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:35.459175 949939 usertrap_amd64.go:122] [ 48741: 48741] Allocate a new trap: 0xc009c87290 41 D0620 03:40:35.459275 949939 task_exit.go:204] [ 48734: 48743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.459341 949939 task_exit.go:204] [ 48734: 48743] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.459442 949939 usertrap_amd64.go:225] [ 48741: 48741] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:35.459445 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:35.459990 949939 task_exit.go:204] [ 48734: 48734] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.460929 949939 task_signals.go:470] [ 48735: 48745] Notified of signal 25 D0620 03:40:35.461306 949939 task_signals.go:204] [ 48735: 48745] Signal 48735, PID: 48745, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:35.461502 949939 task_exit.go:204] [ 48735: 48745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.461638 949939 task_signals.go:204] [ 48735: 48740] Signal 48735, PID: 48740, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.462258 949939 task_exit.go:204] [ 48735: 48740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.462486 949939 task_exit.go:204] [ 48735: 48745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.462553 949939 task_exit.go:204] [ 48735: 48745] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.462469 949939 task_signals.go:204] [ 48735: 48735] Signal 48735, PID: 48735, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.462786 949939 task_exit.go:204] [ 48735: 48735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.463279 949939 task_exit.go:204] [ 48735: 48735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.468916 949939 task_exit.go:204] [ 48735: 48740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.469158 949939 task_exit.go:204] [ 48735: 48740] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.469275 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:35.470613 949939 task_exit.go:204] [ 48735: 48735] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.485824 949939 usertrap_amd64.go:212] [ 48741: 48741] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:35.485905 949939 usertrap_amd64.go:122] [ 48741: 48741] Allocate a new trap: 0xc009c87290 42 D0620 03:40:35.485970 949939 usertrap_amd64.go:225] [ 48741: 48741] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:35.496209 949939 usertrap_amd64.go:212] [ 48741: 48741] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:35.496403 949939 usertrap_amd64.go:122] [ 48741: 48741] Allocate a new trap: 0xc009c87290 43 D0620 03:40:35.496588 949939 usertrap_amd64.go:225] [ 48741: 48741] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:35.504637 949939 task_exit.go:204] [ 48741: 48741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.504886 949939 task_signals.go:204] [ 48741: 48747] Signal 48741, PID: 48747, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.505064 949939 task_signals.go:204] [ 48741: 48746] Signal 48741, PID: 48746, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:35.505197 949939 task_exit.go:204] [ 48741: 48746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.505439 949939 task_exit.go:204] [ 48741: 48746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.505499 949939 task_exit.go:204] [ 48741: 48746] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.505727 949939 task_exit.go:204] [ 48741: 48747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:35.505997 949939 task_exit.go:204] [ 48741: 48741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.510988 949939 task_exit.go:204] [ 48741: 48747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:35.511152 949939 task_exit.go:204] [ 48741: 48747] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:35.511273 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:35.514110 949939 task_exit.go:204] [ 48741: 48741] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.065897 949939 usertrap_amd64.go:212] [ 48720: 48720] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:36.066053 949939 usertrap_amd64.go:122] [ 48720: 48720] Allocate a new trap: 0xc000d0ad80 44 D0620 03:40:36.066167 949939 usertrap_amd64.go:225] [ 48720: 48720] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:36.070510 949939 task_exit.go:204] [ 48720: 48720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.071163 949939 task_exit.go:204] [ 48720: 48720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.071465 949939 task_signals.go:204] [ 48720: 48732] Signal 48720, PID: 48732, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.072036 949939 task_exit.go:204] [ 48720: 48732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.072289 949939 task_exit.go:204] [ 48720: 48732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.072331 949939 task_exit.go:204] [ 48720: 48732] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.071723 949939 task_signals.go:204] [ 48720: 48727] Signal 48720, PID: 48727, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.072567 949939 task_exit.go:204] [ 48720: 48727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.078036 949939 task_exit.go:204] [ 48720: 48727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.078110 949939 task_exit.go:204] [ 48720: 48727] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.078226 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:36.078652 949939 task_exit.go:204] [ 48720: 48720] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 64) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) (async, rerun: 32) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async, rerun: 32) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) (async) r3 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) r4 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r4, 0x5450) dup3(r3, r4, 0x80000) 03:40:36 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') prlimit64(0xffffffffffffffff, 0xc, 0x0, &(0x7f0000000080)) setrlimit(0xb, &(0x7f0000000140)={0x10000, 0x800}) 03:40:36 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x200, 0x5}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 03:40:36 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5d3000, 0x20) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:36.108253 949939 usertrap_amd64.go:212] [ 48749: 48749] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:36.108443 949939 usertrap_amd64.go:122] [ 48749: 48749] Allocate a new trap: 0xc009c87380 40 D0620 03:40:36.109324 949939 usertrap_amd64.go:225] [ 48749: 48749] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:36.109565 949939 usertrap_amd64.go:212] [ 48748: 48748] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:36.109745 949939 usertrap_amd64.go:122] [ 48748: 48748] Allocate a new trap: 0xc001a6ed20 40 D0620 03:40:36.110663 949939 usertrap_amd64.go:225] [ 48748: 48748] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:36.112070 949939 usertrap_amd64.go:212] [ 48750: 48750] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:36.112151 949939 usertrap_amd64.go:212] [ 48751: 48751] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:36.112309 949939 usertrap_amd64.go:122] [ 48751: 48751] Allocate a new trap: 0xc014b20b40 40 D0620 03:40:36.112207 949939 usertrap_amd64.go:122] [ 48750: 48750] Allocate a new trap: 0xc0093af830 40 D0620 03:40:36.112698 949939 usertrap_amd64.go:212] [ 48749: 48749] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:36.112767 949939 usertrap_amd64.go:122] [ 48749: 48749] Allocate a new trap: 0xc009c87380 41 D0620 03:40:36.112842 949939 usertrap_amd64.go:225] [ 48749: 48749] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:36.112987 949939 usertrap_amd64.go:225] [ 48751: 48751] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:36.112912 949939 usertrap_amd64.go:225] [ 48750: 48750] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:36.113593 949939 usertrap_amd64.go:212] [ 48748: 48748] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:36.113703 949939 usertrap_amd64.go:122] [ 48748: 48748] Allocate a new trap: 0xc001a6ed20 41 D0620 03:40:36.113795 949939 usertrap_amd64.go:225] [ 48748: 48748] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:36.115977 949939 usertrap_amd64.go:212] [ 48751: 48751] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:36.116063 949939 usertrap_amd64.go:122] [ 48751: 48751] Allocate a new trap: 0xc014b20b40 41 D0620 03:40:36.116189 949939 usertrap_amd64.go:225] [ 48751: 48751] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:36.116603 949939 usertrap_amd64.go:212] [ 48750: 48750] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:36.116724 949939 usertrap_amd64.go:122] [ 48750: 48750] Allocate a new trap: 0xc0093af830 41 D0620 03:40:36.116793 949939 usertrap_amd64.go:225] [ 48750: 48750] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:36.131365 949939 usertrap_amd64.go:212] [ 48748: 48748] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:36.131489 949939 usertrap_amd64.go:122] [ 48748: 48748] Allocate a new trap: 0xc001a6ed20 42 D0620 03:40:36.131561 949939 usertrap_amd64.go:225] [ 48748: 48748] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:36.141597 949939 usertrap_amd64.go:212] [ 48749: 48749] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:36.141711 949939 usertrap_amd64.go:122] [ 48749: 48749] Allocate a new trap: 0xc009c87380 42 D0620 03:40:36.141825 949939 usertrap_amd64.go:225] [ 48749: 48749] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:36.143474 949939 usertrap_amd64.go:212] [ 48750: 48750] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:36.143528 949939 usertrap_amd64.go:122] [ 48750: 48750] Allocate a new trap: 0xc0093af830 42 D0620 03:40:36.143609 949939 usertrap_amd64.go:225] [ 48750: 48750] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:36.148608 949939 usertrap_amd64.go:212] [ 48749: 48749] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:36.148709 949939 usertrap_amd64.go:122] [ 48749: 48749] Allocate a new trap: 0xc009c87380 43 D0620 03:40:36.148844 949939 usertrap_amd64.go:225] [ 48749: 48749] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:36.538868 949939 usertrap_amd64.go:212] [ 48751: 48751] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:36.538997 949939 usertrap_amd64.go:122] [ 48751: 48751] Allocate a new trap: 0xc014b20b40 42 D0620 03:40:36.539098 949939 usertrap_amd64.go:225] [ 48751: 48751] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:36.542278 949939 usertrap_amd64.go:212] [ 48748: 48748] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:36.542425 949939 usertrap_amd64.go:122] [ 48748: 48748] Allocate a new trap: 0xc001a6ed20 43 D0620 03:40:36.542538 949939 usertrap_amd64.go:225] [ 48748: 48748] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:36.542721 949939 usertrap_amd64.go:212] [ 48750: 48750] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:36.542867 949939 usertrap_amd64.go:122] [ 48750: 48750] Allocate a new trap: 0xc0093af830 43 D0620 03:40:36.542957 949939 usertrap_amd64.go:225] [ 48750: 48750] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:36.543412 949939 task_exit.go:204] [ 48749: 48749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.543594 949939 task_signals.go:204] [ 48749: 48753] Signal 48749, PID: 48753, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.543730 949939 task_exit.go:204] [ 48749: 48753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.543884 949939 task_exit.go:204] [ 48749: 48749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.549661 949939 task_exit.go:204] [ 48749: 48753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.549771 949939 task_exit.go:204] [ 48749: 48753] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.549911 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:36.550611 949939 task_exit.go:204] [ 48749: 48749] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.551439 949939 task_exit.go:204] [ 48748: 48748] Transitioning from exit state TaskExitNone to TaskExitInitiated 03:40:36 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5d3000, 0x20) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x5d3000, 0x20) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) D0620 03:40:36.551841 949939 task_exit.go:204] [ 48748: 48748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.552032 949939 task_signals.go:204] [ 48748: 48755] Signal 48748, PID: 48755, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.552149 949939 task_exit.go:204] [ 48748: 48755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.552047 949939 task_signals.go:204] [ 48748: 48752] Signal 48748, PID: 48752, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.552378 949939 task_exit.go:204] [ 48748: 48752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.552498 949939 task_exit.go:204] [ 48748: 48755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.552553 949939 task_exit.go:204] [ 48748: 48755] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.898857 949939 task_exit.go:204] [ 48748: 48752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.898987 949939 task_exit.go:204] [ 48748: 48752] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.899116 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:36.899376 949939 task_exit.go:204] [ 48748: 48748] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:36 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x200, 0x5}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:36.903056 949939 usertrap_amd64.go:212] [ 48751: 48751] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:36.903189 949939 usertrap_amd64.go:122] [ 48751: 48751] Allocate a new trap: 0xc014b20b40 43 D0620 03:40:36.903302 949939 usertrap_amd64.go:225] [ 48751: 48751] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:36.908725 949939 usertrap_amd64.go:212] [ 48751: 48751] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:36.908869 949939 usertrap_amd64.go:122] [ 48751: 48751] Allocate a new trap: 0xc014b20b40 44 D0620 03:40:36.909032 949939 usertrap_amd64.go:225] [ 48751: 48751] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:36.979227 949939 usertrap_amd64.go:212] [ 48750: 48750] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:36.979331 949939 usertrap_amd64.go:122] [ 48750: 48750] Allocate a new trap: 0xc0093af830 44 D0620 03:40:36.979401 949939 usertrap_amd64.go:225] [ 48750: 48750] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:36.985985 949939 task_exit.go:204] [ 48750: 48750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.986290 949939 task_exit.go:204] [ 48750: 48750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.986490 949939 task_signals.go:204] [ 48750: 48754] Signal 48750, PID: 48754, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.986527 949939 task_signals.go:204] [ 48750: 48756] Signal 48750, PID: 48756, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:36.986778 949939 task_exit.go:204] [ 48750: 48754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.986999 949939 task_exit.go:204] [ 48750: 48754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.987061 949939 task_exit.go:204] [ 48750: 48754] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.987626 949939 task_exit.go:204] [ 48750: 48756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:36.991393 949939 usertrap_amd64.go:212] [ 48762: 48762] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:36.991521 949939 usertrap_amd64.go:122] [ 48762: 48762] Allocate a new trap: 0xc009a013e0 40 D0620 03:40:36.992633 949939 task_exit.go:204] [ 48750: 48756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:36.992714 949939 task_exit.go:204] [ 48750: 48756] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:36.992809 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:36.993221 949939 usertrap_amd64.go:225] [ 48762: 48762] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:36.993450 949939 task_exit.go:204] [ 48750: 48750] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:36 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async, rerun: 64) chdir(&(0x7f0000000040)='./file0\x00') (async, rerun: 64) prlimit64(0xffffffffffffffff, 0xc, 0x0, &(0x7f0000000080)) setrlimit(0xb, &(0x7f0000000140)={0x10000, 0x800}) D0620 03:40:36.997451 949939 usertrap_amd64.go:212] [ 48762: 48762] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:36.997593 949939 usertrap_amd64.go:122] [ 48762: 48762] Allocate a new trap: 0xc009a013e0 41 D0620 03:40:36.997808 949939 usertrap_amd64.go:225] [ 48762: 48762] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:37.009216 949939 task_exit.go:204] [ 48751: 48751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.009455 949939 task_exit.go:204] [ 48751: 48751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.009687 949939 task_signals.go:204] [ 48751: 48757] Signal 48751, PID: 48757, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.009805 949939 task_exit.go:204] [ 48751: 48757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.010074 949939 task_signals.go:204] [ 48751: 48759] Signal 48751, PID: 48759, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.010053 949939 task_signals.go:204] [ 48751: 48758] Signal 48751, PID: 48758, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.010288 949939 task_signals.go:204] [ 48751: 48760] Signal 48751, PID: 48760, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.010424 949939 task_signals.go:204] [ 48751: 48761] Signal 48751, PID: 48761, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.010521 949939 task_exit.go:204] [ 48751: 48757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.010580 949939 task_exit.go:204] [ 48751: 48757] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.010730 949939 task_exit.go:204] [ 48751: 48759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.010935 949939 task_exit.go:204] [ 48751: 48759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.010973 949939 task_exit.go:204] [ 48751: 48759] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.011253 949939 task_exit.go:204] [ 48751: 48758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.011377 949939 task_exit.go:204] [ 48751: 48760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.011570 949939 task_exit.go:204] [ 48751: 48761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.011810 949939 task_exit.go:204] [ 48751: 48761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.011864 949939 task_exit.go:204] [ 48751: 48761] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.012046 949939 task_exit.go:204] [ 48751: 48760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.012115 949939 task_exit.go:204] [ 48751: 48760] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.016712 949939 usertrap_amd64.go:212] [ 48762: 48762] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:37.016777 949939 usertrap_amd64.go:122] [ 48762: 48762] Allocate a new trap: 0xc009a013e0 42 D0620 03:40:37.016838 949939 usertrap_amd64.go:225] [ 48762: 48762] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:37.018065 949939 usertrap_amd64.go:212] [ 48763: 48763] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:37.018184 949939 usertrap_amd64.go:122] [ 48763: 48763] Allocate a new trap: 0xc0066f37d0 40 D0620 03:40:37.018920 949939 usertrap_amd64.go:225] [ 48763: 48763] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:37.022987 949939 usertrap_amd64.go:212] [ 48763: 48763] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:37.023042 949939 usertrap_amd64.go:122] [ 48763: 48763] Allocate a new trap: 0xc0066f37d0 41 D0620 03:40:37.023123 949939 usertrap_amd64.go:225] [ 48763: 48763] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:37.023879 949939 task_exit.go:204] [ 48751: 48758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.023987 949939 task_exit.go:204] [ 48751: 48758] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.024079 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:37.025494 949939 task_exit.go:204] [ 48751: 48751] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) r3 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) r4 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r4, 0x5450) (async) ioctl$FIONCLEX(r4, 0x5450) dup3(r3, r4, 0x80000) D0620 03:40:37.041192 949939 usertrap_amd64.go:212] [ 48762: 48762] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:37.041284 949939 usertrap_amd64.go:122] [ 48762: 48762] Allocate a new trap: 0xc009a013e0 43 D0620 03:40:37.041365 949939 usertrap_amd64.go:225] [ 48762: 48762] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:37.042666 949939 usertrap_amd64.go:212] [ 48763: 48763] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:37.042738 949939 usertrap_amd64.go:122] [ 48763: 48763] Allocate a new trap: 0xc0066f37d0 42 D0620 03:40:37.042807 949939 usertrap_amd64.go:225] [ 48763: 48763] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:37.043683 949939 usertrap_amd64.go:212] [ 48762: 48762] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:37.043772 949939 usertrap_amd64.go:122] [ 48762: 48762] Allocate a new trap: 0xc009a013e0 44 D0620 03:40:37.043844 949939 usertrap_amd64.go:225] [ 48762: 48762] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:37.045933 949939 usertrap_amd64.go:212] [ 48765: 48765] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:37.046054 949939 usertrap_amd64.go:122] [ 48765: 48765] Allocate a new trap: 0xc00945e1e0 40 D0620 03:40:37.046647 949939 usertrap_amd64.go:225] [ 48765: 48765] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:37.050647 949939 task_exit.go:204] [ 48762: 48762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.050864 949939 task_signals.go:204] [ 48762: 48767] Signal 48762, PID: 48767, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.050896 949939 task_signals.go:204] [ 48762: 48766] Signal 48762, PID: 48766, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.050969 949939 task_exit.go:204] [ 48762: 48767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.051204 949939 task_exit.go:204] [ 48762: 48766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.051525 949939 usertrap_amd64.go:212] [ 48765: 48765] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:37.051561 949939 task_signals.go:204] [ 48762: 48764] Signal 48762, PID: 48764, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.051573 949939 usertrap_amd64.go:122] [ 48765: 48765] Allocate a new trap: 0xc00945e1e0 41 D0620 03:40:37.051652 949939 task_exit.go:204] [ 48762: 48767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.051709 949939 task_exit.go:204] [ 48762: 48767] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.051716 949939 usertrap_amd64.go:225] [ 48765: 48765] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:37.052021 949939 task_exit.go:204] [ 48762: 48764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.052430 949939 task_exit.go:204] [ 48762: 48762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.052552 949939 task_exit.go:204] [ 48762: 48766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.052594 949939 task_exit.go:204] [ 48762: 48766] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.058488 949939 task_exit.go:204] [ 48762: 48764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.058638 949939 task_exit.go:204] [ 48762: 48764] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.058803 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:37.058992 949939 task_exit.go:204] [ 48762: 48762] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:37 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5d3000, 0x20) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:37.137055 949939 usertrap_amd64.go:212] [ 48765: 48765] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:37.137201 949939 usertrap_amd64.go:122] [ 48765: 48765] Allocate a new trap: 0xc00945e1e0 42 D0620 03:40:37.137280 949939 usertrap_amd64.go:225] [ 48765: 48765] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:37.198219 949939 usertrap_amd64.go:212] [ 48765: 48765] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:37.198321 949939 usertrap_amd64.go:122] [ 48765: 48765] Allocate a new trap: 0xc00945e1e0 43 D0620 03:40:37.198399 949939 usertrap_amd64.go:225] [ 48765: 48765] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:37.234572 949939 usertrap_amd64.go:212] [ 48763: 48763] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:37.234719 949939 usertrap_amd64.go:122] [ 48763: 48763] Allocate a new trap: 0xc0066f37d0 43 D0620 03:40:37.234808 949939 usertrap_amd64.go:225] [ 48763: 48763] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:37.533942 949939 usertrap_amd64.go:212] [ 48769: 48769] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:37.534100 949939 usertrap_amd64.go:122] [ 48769: 48769] Allocate a new trap: 0xc004592f90 40 D0620 03:40:37.534711 949939 usertrap_amd64.go:225] [ 48769: 48769] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:37.534759 949939 usertrap_amd64.go:212] [ 48763: 48763] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:37.534883 949939 usertrap_amd64.go:122] [ 48763: 48763] Allocate a new trap: 0xc0066f37d0 44 D0620 03:40:37.534988 949939 usertrap_amd64.go:225] [ 48763: 48763] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:37.539625 949939 usertrap_amd64.go:212] [ 48769: 48769] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:37.540198 949939 usertrap_amd64.go:122] [ 48769: 48769] Allocate a new trap: 0xc004592f90 41 D0620 03:40:37.540333 949939 usertrap_amd64.go:225] [ 48769: 48769] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:37.545848 949939 usertrap_amd64.go:212] [ 48765: 48765] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:37.545839 949939 task_exit.go:204] [ 48763: 48763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.545926 949939 usertrap_amd64.go:122] [ 48765: 48765] Allocate a new trap: 0xc00945e1e0 44 D0620 03:40:37.546021 949939 task_signals.go:204] [ 48763: 48770] Signal 48763, PID: 48770, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.546043 949939 task_signals.go:204] [ 48763: 48772] Signal 48763, PID: 48772, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.546037 949939 usertrap_amd64.go:225] [ 48765: 48765] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:37.546215 949939 task_exit.go:204] [ 48763: 48770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.546331 949939 task_exit.go:204] [ 48763: 48772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.546549 949939 task_signals.go:204] [ 48763: 48771] Signal 48763, PID: 48771, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.546569 949939 task_signals.go:204] [ 48763: 48774] Signal 48763, PID: 48774, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.546726 949939 task_exit.go:204] [ 48763: 48774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.546620 949939 task_signals.go:204] [ 48763: 48768] Signal 48763, PID: 48768, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.546935 949939 task_exit.go:204] [ 48763: 48768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.547190 949939 task_exit.go:204] [ 48763: 48768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.547272 949939 task_exit.go:204] [ 48763: 48768] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.547528 949939 task_exit.go:204] [ 48763: 48763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.547787 949939 task_exit.go:204] [ 48763: 48774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.547882 949939 task_exit.go:204] [ 48763: 48774] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.548189 949939 task_exit.go:204] [ 48763: 48772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.548287 949939 task_exit.go:204] [ 48763: 48772] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.548483 949939 task_exit.go:204] [ 48763: 48771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.548827 949939 task_exit.go:204] [ 48763: 48771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.549024 949939 task_exit.go:204] [ 48763: 48771] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.554452 949939 task_exit.go:204] [ 48765: 48765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.554869 949939 task_signals.go:204] [ 48765: 48775] Signal 48765, PID: 48775, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.554827 949939 task_signals.go:204] [ 48765: 48777] Signal 48765, PID: 48777, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.554848 949939 task_signals.go:204] [ 48765: 48773] Signal 48765, PID: 48773, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.554912 949939 task_signals.go:204] [ 48765: 48776] Signal 48765, PID: 48776, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.554959 949939 task_exit.go:204] [ 48765: 48765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.555130 949939 task_exit.go:204] [ 48765: 48775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.555316 949939 task_exit.go:204] [ 48765: 48777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.555580 949939 task_exit.go:204] [ 48765: 48773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.556119 949939 task_exit.go:204] [ 48765: 48773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.556185 949939 task_exit.go:204] [ 48765: 48773] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.556384 949939 task_exit.go:204] [ 48763: 48770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.556491 949939 task_exit.go:204] [ 48763: 48770] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.556674 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:37.557075 949939 task_exit.go:204] [ 48765: 48776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.557413 949939 task_exit.go:204] [ 48763: 48763] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.557677 949939 task_exit.go:204] [ 48765: 48775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.557913 949939 task_exit.go:204] [ 48765: 48775] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.558181 949939 task_exit.go:204] [ 48765: 48777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.558245 949939 task_exit.go:204] [ 48765: 48777] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:37 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x200, 0x5}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x200, 0x5}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) pipe2$watch_queue(&(0x7f0000000140), 0x80) (async) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) D0620 03:40:37.562513 949939 task_exit.go:204] [ 48765: 48776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.562589 949939 task_exit.go:204] [ 48765: 48776] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.562638 949939 usertrap_amd64.go:212] [ 48769: 48769] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:37.562709 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:37.562753 949939 usertrap_amd64.go:122] [ 48769: 48769] Allocate a new trap: 0xc004592f90 42 D0620 03:40:37.562854 949939 task_exit.go:204] [ 48765: 48765] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.562861 949939 usertrap_amd64.go:225] [ 48769: 48769] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) 03:40:37 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') (async, rerun: 64) prlimit64(0xffffffffffffffff, 0xc, 0x0, &(0x7f0000000080)) (rerun: 64) setrlimit(0xb, &(0x7f0000000140)={0x10000, 0x800}) D0620 03:40:37.568514 949939 usertrap_amd64.go:212] [ 48778: 48778] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:37.568601 949939 usertrap_amd64.go:122] [ 48778: 48778] Allocate a new trap: 0xc0066f3920 40 D0620 03:40:37.569246 949939 usertrap_amd64.go:225] [ 48778: 48778] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:37.633085 949939 usertrap_amd64.go:212] [ 48778: 48778] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:37.633263 949939 usertrap_amd64.go:122] [ 48778: 48778] Allocate a new trap: 0xc0066f3920 41 D0620 03:40:37.633357 949939 usertrap_amd64.go:225] [ 48778: 48778] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:37.649509 949939 usertrap_amd64.go:212] [ 48782: 48782] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:37.649658 949939 usertrap_amd64.go:122] [ 48782: 48782] Allocate a new trap: 0xc01f00fe60 40 D0620 03:40:37.650243 949939 usertrap_amd64.go:225] [ 48782: 48782] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:37.653371 949939 usertrap_amd64.go:212] [ 48782: 48782] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:37.653451 949939 usertrap_amd64.go:122] [ 48782: 48782] Allocate a new trap: 0xc01f00fe60 41 D0620 03:40:37.653570 949939 usertrap_amd64.go:225] [ 48782: 48782] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:37.656527 949939 usertrap_amd64.go:212] [ 48781: 48781] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:37.656677 949939 usertrap_amd64.go:122] [ 48781: 48781] Allocate a new trap: 0xc003085200 40 D0620 03:40:37.656992 949939 usertrap_amd64.go:212] [ 48778: 48778] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:37.657209 949939 usertrap_amd64.go:122] [ 48778: 48778] Allocate a new trap: 0xc0066f3920 42 D0620 03:40:37.657340 949939 usertrap_amd64.go:225] [ 48781: 48781] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:37.657501 949939 usertrap_amd64.go:225] [ 48778: 48778] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:37.661594 949939 usertrap_amd64.go:212] [ 48781: 48781] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:37.661820 949939 usertrap_amd64.go:122] [ 48781: 48781] Allocate a new trap: 0xc003085200 41 D0620 03:40:37.661908 949939 usertrap_amd64.go:225] [ 48781: 48781] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:37.667133 949939 usertrap_amd64.go:212] [ 48778: 48778] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:37.667213 949939 usertrap_amd64.go:122] [ 48778: 48778] Allocate a new trap: 0xc0066f3920 43 D0620 03:40:37.667323 949939 usertrap_amd64.go:225] [ 48778: 48778] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:37.671223 949939 task_exit.go:204] [ 48778: 48778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.671435 949939 task_exit.go:204] [ 48778: 48778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.671564 949939 task_signals.go:204] [ 48778: 48783] Signal 48778, PID: 48783, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.671651 949939 task_exit.go:204] [ 48778: 48783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.671830 949939 task_exit.go:204] [ 48778: 48783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.671892 949939 task_exit.go:204] [ 48778: 48783] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.672054 949939 task_signals.go:204] [ 48778: 48784] Signal 48778, PID: 48784, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:37.672145 949939 task_exit.go:204] [ 48778: 48784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:37.674322 949939 usertrap_amd64.go:212] [ 48782: 48782] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:37.674412 949939 usertrap_amd64.go:122] [ 48782: 48782] Allocate a new trap: 0xc01f00fe60 42 D0620 03:40:37.674494 949939 usertrap_amd64.go:225] [ 48782: 48782] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:37.677462 949939 task_exit.go:204] [ 48778: 48784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:37.677560 949939 task_exit.go:204] [ 48778: 48784] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:37.677645 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:37.678395 949939 task_exit.go:204] [ 48778: 48778] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:37 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wg1\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="35000000000000000700000000000000ac1414aa000080000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f0000017f00000100000001090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffff0000080000000000000600000000000000ffffffff00"/184]}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:37.690622 949939 usertrap_amd64.go:212] [ 48781: 48781] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:37.690717 949939 usertrap_amd64.go:122] [ 48781: 48781] Allocate a new trap: 0xc003085200 42 D0620 03:40:37.690830 949939 usertrap_amd64.go:225] [ 48781: 48781] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:38.133823 949939 usertrap_amd64.go:212] [ 48769: 48769] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:38.133945 949939 usertrap_amd64.go:122] [ 48769: 48769] Allocate a new trap: 0xc004592f90 43 D0620 03:40:38.134035 949939 usertrap_amd64.go:225] [ 48769: 48769] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:38.143611 949939 usertrap_amd64.go:212] [ 48781: 48781] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:38.143832 949939 usertrap_amd64.go:122] [ 48781: 48781] Allocate a new trap: 0xc003085200 43 D0620 03:40:38.144117 949939 usertrap_amd64.go:225] [ 48781: 48781] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:38.151247 949939 usertrap_amd64.go:212] [ 48782: 48782] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:38.151521 949939 usertrap_amd64.go:122] [ 48782: 48782] Allocate a new trap: 0xc01f00fe60 43 D0620 03:40:38.151783 949939 usertrap_amd64.go:225] [ 48782: 48782] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:38.153561 949939 usertrap_amd64.go:212] [ 48782: 48782] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:38.153774 949939 usertrap_amd64.go:122] [ 48782: 48782] Allocate a new trap: 0xc01f00fe60 44 D0620 03:40:38.153997 949939 usertrap_amd64.go:225] [ 48782: 48782] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:38.159681 949939 task_exit.go:204] [ 48782: 48782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.160032 949939 task_exit.go:204] [ 48782: 48782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.160269 949939 task_signals.go:204] [ 48782: 48790] Signal 48782, PID: 48790, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.160401 949939 task_exit.go:204] [ 48782: 48790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.160604 949939 task_exit.go:204] [ 48782: 48790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.160683 949939 task_exit.go:204] [ 48782: 48790] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.160789 949939 task_signals.go:204] [ 48782: 48791] Signal 48782, PID: 48791, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.160853 949939 task_exit.go:204] [ 48782: 48791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.160832 949939 task_signals.go:204] [ 48782: 48785] Signal 48782, PID: 48785, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.161037 949939 task_exit.go:204] [ 48782: 48791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.161078 949939 task_exit.go:204] [ 48782: 48791] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.161203 949939 task_exit.go:204] [ 48782: 48785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.168622 949939 task_exit.go:204] [ 48782: 48785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.168736 949939 task_exit.go:204] [ 48782: 48785] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.169019 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:38.169550 949939 task_exit.go:204] [ 48782: 48782] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.171514 949939 usertrap_amd64.go:212] [ 48792: 48792] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:38.171636 949939 usertrap_amd64.go:122] [ 48792: 48792] Allocate a new trap: 0xc001a6ede0 40 D0620 03:40:38.172304 949939 usertrap_amd64.go:225] [ 48792: 48792] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) 03:40:38 executing program 3: r0 = open(&(0x7f0000000240)='./file1\x00', 0x105042, 0xc) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x3) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) openat$incfs(r1, &(0x7f0000000200)='.pending_reads\x00', 0x2400, 0x4d) utime(&(0x7f0000000000)='./bus\x00', 0x0) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="b79ecc694dec839f9d946bfe76ec853b6a78813858f0baf2a679e900955ac12e19d908305af26417c7fc5bcc6ad3ea36d081f7a3db946a51a334b31b6a64e174d4f0e8589a682d44b012eb6da9e785d98890961a7d31049f5a1253eb482d9b113545f6a009e31933f7625c6a5fb4572d090a61f9af2625f08287c950ce190e784ba3c5ebcbc27e6c4b7869d47009d2be64896516bef9008ed0fd2e8fdc522f4fc4f97e90819804c3263b390e6c9207d13609bfb4cc88250246c237a1a418a379ed467b8ee607b9b27b16f3ba1f9198578d298ecd88e1b8c8cb2feea3e4323fe7eef6babcd1c764ffc6ebb02ef2435becabdd7cb85eb3d3decc184a79eef14c05") setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) setxattr$incfs_size(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180), &(0x7f00000001c0)=0x4, 0x8, 0x1) D0620 03:40:38.176131 949939 usertrap_amd64.go:212] [ 48792: 48792] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:38.176201 949939 usertrap_amd64.go:122] [ 48792: 48792] Allocate a new trap: 0xc001a6ede0 41 D0620 03:40:38.176320 949939 usertrap_amd64.go:225] [ 48792: 48792] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:38.269007 949939 usertrap_amd64.go:212] [ 48792: 48792] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:38.269152 949939 usertrap_amd64.go:122] [ 48792: 48792] Allocate a new trap: 0xc001a6ede0 42 D0620 03:40:38.269240 949939 usertrap_amd64.go:225] [ 48792: 48792] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:38.275670 949939 usertrap_amd64.go:212] [ 48793: 48793] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:38.275802 949939 usertrap_amd64.go:122] [ 48793: 48793] Allocate a new trap: 0xc0030852f0 40 D0620 03:40:38.615968 949939 usertrap_amd64.go:212] [ 48781: 48781] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:38.616090 949939 usertrap_amd64.go:122] [ 48781: 48781] Allocate a new trap: 0xc003085200 44 D0620 03:40:38.615973 949939 usertrap_amd64.go:212] [ 48769: 48769] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:38.616186 949939 usertrap_amd64.go:225] [ 48781: 48781] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:38.616160 949939 usertrap_amd64.go:122] [ 48769: 48769] Allocate a new trap: 0xc004592f90 44 D0620 03:40:38.616329 949939 usertrap_amd64.go:225] [ 48769: 48769] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:38.616033 949939 usertrap_amd64.go:225] [ 48793: 48793] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:38.620038 949939 usertrap_amd64.go:212] [ 48793: 48793] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:38.620176 949939 usertrap_amd64.go:122] [ 48793: 48793] Allocate a new trap: 0xc0030852f0 41 D0620 03:40:38.620265 949939 usertrap_amd64.go:225] [ 48793: 48793] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:38.622876 949939 task_exit.go:204] [ 48769: 48769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.623136 949939 task_exit.go:204] [ 48769: 48769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.623297 949939 task_signals.go:204] [ 48769: 48788] Signal 48769, PID: 48788, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.623403 949939 task_exit.go:204] [ 48769: 48788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.623410 949939 task_signals.go:204] [ 48769: 48779] Signal 48769, PID: 48779, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.623510 949939 task_signals.go:204] [ 48769: 48780] Signal 48769, PID: 48780, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.623537 949939 task_signals.go:204] [ 48781: 48789] Signal 48781, PID: 48789, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.623551 949939 task_exit.go:204] [ 48769: 48779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.623691 949939 task_exit.go:204] [ 48769: 48780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.623872 949939 task_signals.go:204] [ 48781: 48786] Signal 48781, PID: 48786, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:38.623957 949939 task_exit.go:204] [ 48781: 48786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.624208 949939 task_exit.go:204] [ 48781: 48781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.624426 949939 task_exit.go:204] [ 48781: 48789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:38.625041 949939 task_exit.go:204] [ 48769: 48788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.625119 949939 task_exit.go:204] [ 48769: 48788] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.625235 949939 task_exit.go:204] [ 48769: 48779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.625287 949939 task_exit.go:204] [ 48769: 48779] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.625439 949939 task_exit.go:204] [ 48781: 48781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.625655 949939 task_exit.go:204] [ 48781: 48789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.625732 949939 task_exit.go:204] [ 48781: 48789] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.625869 949939 task_exit.go:204] [ 48781: 48786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.625933 949939 task_exit.go:204] [ 48781: 48786] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.629480 949939 task_exit.go:204] [ 48769: 48780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:38.629631 949939 task_exit.go:204] [ 48769: 48780] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:38.629749 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:38.629904 949939 task_exit.go:204] [ 48769: 48769] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x9, 0xa2, 0x4, 0x0, 0x6ccd, 0x88182, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0xc, 0xffffffff, 0x1, 0x7, 0x8, 0x7, 0x0, 0x0, 0x31f, 0x0, 0x8}, 0x0, 0x7, r0, 0x2) dup2(r2, r3) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'tunl0\x00', 0x100}) D0620 03:40:38.720894 949939 usertrap_amd64.go:212] [ 48792: 48792] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:39.101267 949939 usertrap_amd64.go:122] [ 48792: 48792] Allocate a new trap: 0xc001a6ede0 43 D0620 03:40:39.101343 949939 task_signals.go:204] [ 48781: 48787] Signal 48781, PID: 48787, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:39.101515 949939 task_exit.go:204] [ 48781: 48787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.101393 949939 usertrap_amd64.go:225] [ 48792: 48792] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:39.113069 949939 usertrap_amd64.go:212] [ 48792: 48792] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:39.113178 949939 usertrap_amd64.go:122] [ 48792: 48792] Allocate a new trap: 0xc001a6ede0 44 D0620 03:40:39.113269 949939 usertrap_amd64.go:225] [ 48792: 48792] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:39.117446 949939 task_exit.go:204] [ 48792: 48792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.117754 949939 task_exit.go:204] [ 48792: 48792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.117927 949939 task_signals.go:204] [ 48792: 48794] Signal 48792, PID: 48794, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:39.117981 949939 task_signals.go:204] [ 48792: 48796] Signal 48792, PID: 48796, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:39.118092 949939 task_exit.go:204] [ 48792: 48794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.118286 949939 task_signals.go:204] [ 48792: 48795] Signal 48792, PID: 48795, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:39.118466 949939 task_exit.go:204] [ 48792: 48794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.118518 949939 task_exit.go:204] [ 48792: 48794] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:39.118630 949939 task_exit.go:204] [ 48792: 48796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.118784 949939 task_exit.go:204] [ 48792: 48796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.118836 949939 task_exit.go:204] [ 48792: 48796] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:39.118909 949939 task_exit.go:204] [ 48792: 48795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.119372 949939 usertrap_amd64.go:212] [ 48793: 48793] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:39.119466 949939 usertrap_amd64.go:122] [ 48793: 48793] Allocate a new trap: 0xc0030852f0 42 D0620 03:40:39.119558 949939 usertrap_amd64.go:225] [ 48793: 48793] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:39.126107 949939 task_exit.go:204] [ 48792: 48795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.126223 949939 task_exit.go:204] [ 48792: 48795] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:39.126351 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:39.126538 949939 task_exit.go:204] [ 48792: 48792] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:39.127426 949939 task_exit.go:204] [ 48781: 48787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.127539 949939 task_exit.go:204] [ 48781: 48787] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:39 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wg1\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="35000000000000000700000000000000ac1414aa000080000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f0000017f00000100000001090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffff0000080000000000000600000000000000ffffffff00"/184]}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:39.127647 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:39.128377 949939 task_exit.go:204] [ 48781: 48781] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:39 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r0 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240), 0x4, 0x0) fallocate(r0, 0x6f, 0x1, 0x45) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) D0620 03:40:39.211062 949939 usertrap_amd64.go:212] [ 48797: 48797] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:39.211210 949939 usertrap_amd64.go:122] [ 48797: 48797] Allocate a new trap: 0xc014b20c90 40 D0620 03:40:39.211824 949939 usertrap_amd64.go:225] [ 48797: 48797] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:39.216340 949939 usertrap_amd64.go:212] [ 48797: 48797] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:39.216430 949939 usertrap_amd64.go:122] [ 48797: 48797] Allocate a new trap: 0xc014b20c90 41 D0620 03:40:39.216509 949939 usertrap_amd64.go:225] [ 48797: 48797] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:39.222139 949939 usertrap_amd64.go:212] [ 48800: 48800] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:39.222266 949939 usertrap_amd64.go:122] [ 48800: 48800] Allocate a new trap: 0xc009a016b0 40 D0620 03:40:39.222845 949939 usertrap_amd64.go:225] [ 48800: 48800] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:39.225524 949939 usertrap_amd64.go:212] [ 48800: 48800] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:39.225574 949939 usertrap_amd64.go:122] [ 48800: 48800] Allocate a new trap: 0xc009a016b0 41 D0620 03:40:39.225638 949939 usertrap_amd64.go:225] [ 48800: 48800] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:39.240468 949939 usertrap_amd64.go:212] [ 48797: 48797] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:39.240569 949939 usertrap_amd64.go:122] [ 48797: 48797] Allocate a new trap: 0xc014b20c90 42 D0620 03:40:39.240637 949939 usertrap_amd64.go:225] [ 48797: 48797] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:39.247837 949939 usertrap_amd64.go:212] [ 48801: 48801] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:39.247962 949939 usertrap_amd64.go:122] [ 48801: 48801] Allocate a new trap: 0xc001a6eea0 40 D0620 03:40:39.249043 949939 usertrap_amd64.go:225] [ 48801: 48801] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:39.262220 949939 usertrap_amd64.go:212] [ 48801: 48801] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:39.262366 949939 usertrap_amd64.go:122] [ 48801: 48801] Allocate a new trap: 0xc001a6eea0 41 D0620 03:40:39.262453 949939 usertrap_amd64.go:225] [ 48801: 48801] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:39.265666 949939 usertrap_amd64.go:212] [ 48800: 48800] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:39.265933 949939 usertrap_amd64.go:122] [ 48800: 48800] Allocate a new trap: 0xc009a016b0 42 D0620 03:40:39.266132 949939 usertrap_amd64.go:225] [ 48800: 48800] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:39.281147 949939 usertrap_amd64.go:212] [ 48793: 48793] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:39.751855 949939 usertrap_amd64.go:122] [ 48793: 48793] Allocate a new trap: 0xc0030852f0 43 D0620 03:40:39.751970 949939 usertrap_amd64.go:225] [ 48793: 48793] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:39.753743 949939 usertrap_amd64.go:212] [ 48793: 48793] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:39.753847 949939 usertrap_amd64.go:122] [ 48793: 48793] Allocate a new trap: 0xc0030852f0 44 D0620 03:40:39.753982 949939 usertrap_amd64.go:225] [ 48793: 48793] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:39.755551 949939 usertrap_amd64.go:212] [ 48797: 48797] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:39.755665 949939 usertrap_amd64.go:122] [ 48797: 48797] Allocate a new trap: 0xc014b20c90 43 D0620 03:40:39.755768 949939 usertrap_amd64.go:225] [ 48797: 48797] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:39.757396 949939 usertrap_amd64.go:212] [ 48800: 48800] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:39.757508 949939 usertrap_amd64.go:122] [ 48800: 48800] Allocate a new trap: 0xc009a016b0 43 D0620 03:40:39.757583 949939 usertrap_amd64.go:225] [ 48800: 48800] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:39.762548 949939 task_exit.go:204] [ 48793: 48793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.762945 949939 task_signals.go:204] [ 48793: 48799] Signal 48793, PID: 48799, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:39.763192 949939 task_exit.go:204] [ 48793: 48799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.763307 949939 task_exit.go:204] [ 48793: 48793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.763915 949939 task_exit.go:204] [ 48793: 48799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.764028 949939 task_exit.go:204] [ 48793: 48799] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:39.763570 949939 task_signals.go:204] [ 48793: 48798] Signal 48793, PID: 48798, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:39.765659 949939 task_exit.go:204] [ 48793: 48798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:39.771314 949939 task_exit.go:204] [ 48793: 48798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:39.771399 949939 task_exit.go:204] [ 48793: 48798] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:39.771495 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:39.772276 949939 task_exit.go:204] [ 48793: 48793] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:39 executing program 3: r0 = open(&(0x7f0000000240)='./file1\x00', 0x105042, 0xc) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x3) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) openat$incfs(r1, &(0x7f0000000200)='.pending_reads\x00', 0x2400, 0x4d) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="b79ecc694dec839f9d946bfe76ec853b6a78813858f0baf2a679e900955ac12e19d908305af26417c7fc5bcc6ad3ea36d081f7a3db946a51a334b31b6a64e174d4f0e8589a682d44b012eb6da9e785d98890961a7d31049f5a1253eb482d9b113545f6a009e31933f7625c6a5fb4572d090a61f9af2625f08287c950ce190e784ba3c5ebcbc27e6c4b7869d47009d2be64896516bef9008ed0fd2e8fdc522f4fc4f97e90819804c3263b390e6c9207d13609bfb4cc88250246c237a1a418a379ed467b8ee607b9b27b16f3ba1f9198578d298ecd88e1b8c8cb2feea3e4323fe7eef6babcd1c764ffc6ebb02ef2435becabdd7cb85eb3d3decc184a79eef14c05") (async) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="b79ecc694dec839f9d946bfe76ec853b6a78813858f0baf2a679e900955ac12e19d908305af26417c7fc5bcc6ad3ea36d081f7a3db946a51a334b31b6a64e174d4f0e8589a682d44b012eb6da9e785d98890961a7d31049f5a1253eb482d9b113545f6a009e31933f7625c6a5fb4572d090a61f9af2625f08287c950ce190e784ba3c5ebcbc27e6c4b7869d47009d2be64896516bef9008ed0fd2e8fdc522f4fc4f97e90819804c3263b390e6c9207d13609bfb4cc88250246c237a1a418a379ed467b8ee607b9b27b16f3ba1f9198578d298ecd88e1b8c8cb2feea3e4323fe7eef6babcd1c764ffc6ebb02ef2435becabdd7cb85eb3d3decc184a79eef14c05") setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) setxattr$incfs_size(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180), &(0x7f00000001c0)=0x4, 0x8, 0x1) (async) setxattr$incfs_size(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180), &(0x7f00000001c0)=0x4, 0x8, 0x1) D0620 03:40:40.064201 949939 usertrap_amd64.go:212] [ 48797: 48797] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:40.064304 949939 usertrap_amd64.go:122] [ 48797: 48797] Allocate a new trap: 0xc014b20c90 44 D0620 03:40:40.064402 949939 usertrap_amd64.go:225] [ 48797: 48797] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:40.070557 949939 task_exit.go:204] [ 48797: 48797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.070780 949939 task_exit.go:204] [ 48797: 48797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.070995 949939 task_signals.go:204] [ 48797: 48804] Signal 48797, PID: 48804, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:40.071059 949939 task_signals.go:204] [ 48797: 48802] Signal 48797, PID: 48802, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:40.071110 949939 task_exit.go:204] [ 48797: 48804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.071323 949939 task_exit.go:204] [ 48797: 48802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.071619 949939 task_exit.go:204] [ 48797: 48804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.071720 949939 task_exit.go:204] [ 48797: 48804] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:40.076807 949939 task_exit.go:204] [ 48797: 48802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.077416 949939 task_exit.go:204] [ 48797: 48802] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:40.077556 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:40.077810 949939 task_exit.go:204] [ 48797: 48797] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x9, 0xa2, 0x4, 0x0, 0x6ccd, 0x88182, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0xc, 0xffffffff, 0x1, 0x7, 0x8, 0x7, 0x0, 0x0, 0x31f, 0x0, 0x8}, 0x0, 0x7, r0, 0x2) dup2(r2, r3) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async, rerun: 64) socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) (async) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'tunl0\x00', 0x100}) D0620 03:40:40.087780 949939 usertrap_amd64.go:212] [ 48800: 48800] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:40.087904 949939 usertrap_amd64.go:122] [ 48800: 48800] Allocate a new trap: 0xc009a016b0 44 D0620 03:40:40.087984 949939 usertrap_amd64.go:225] [ 48800: 48800] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:40.096193 949939 task_exit.go:204] [ 48800: 48800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.096359 949939 task_signals.go:204] [ 48800: 48806] Signal 48800, PID: 48806, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:40.096458 949939 task_exit.go:204] [ 48800: 48806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.096734 949939 task_exit.go:204] [ 48800: 48800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.096862 949939 task_exit.go:204] [ 48800: 48806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.096985 949939 task_exit.go:204] [ 48800: 48806] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:40.208598 949939 task_signals.go:204] [ 48800: 48803] Signal 48800, PID: 48803, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:40.208703 949939 task_signals.go:204] [ 48800: 48805] Signal 48800, PID: 48805, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:40.208780 949939 task_exit.go:204] [ 48800: 48803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.208927 949939 task_exit.go:204] [ 48800: 48805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.209390 949939 task_exit.go:204] [ 48800: 48803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.209467 949939 task_exit.go:204] [ 48800: 48803] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:40.217902 949939 task_exit.go:204] [ 48800: 48805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.218037 949939 task_exit.go:204] [ 48800: 48805] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:40.218153 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:40.218334 949939 task_exit.go:204] [ 48800: 48800] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:40 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wg1\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="35000000000000000700000000000000ac1414aa000080000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f0000017f00000100000001090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffff0000080000000000000600000000000000ffffffff00"/184]}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:40.220357 949939 usertrap_amd64.go:212] [ 48801: 48801] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:40.220461 949939 usertrap_amd64.go:122] [ 48801: 48801] Allocate a new trap: 0xc001a6eea0 42 D0620 03:40:40.220551 949939 usertrap_amd64.go:225] [ 48801: 48801] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:40.308185 949939 usertrap_amd64.go:212] [ 48801: 48801] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:40.308312 949939 usertrap_amd64.go:122] [ 48801: 48801] Allocate a new trap: 0xc001a6eea0 43 D0620 03:40:40.308429 949939 usertrap_amd64.go:225] [ 48801: 48801] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:40.308832 949939 usertrap_amd64.go:212] [ 48808: 48808] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:40.309012 949939 usertrap_amd64.go:122] [ 48808: 48808] Allocate a new trap: 0xc001a6f080 40 D0620 03:40:40.309691 949939 usertrap_amd64.go:225] [ 48808: 48808] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:40.314419 949939 usertrap_amd64.go:212] [ 48808: 48808] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:40.314527 949939 usertrap_amd64.go:122] [ 48808: 48808] Allocate a new trap: 0xc001a6f080 41 D0620 03:40:40.314625 949939 usertrap_amd64.go:225] [ 48808: 48808] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:40.323195 949939 task_exit.go:204] [ 48801: 48801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.323467 949939 task_exit.go:204] [ 48801: 48801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.323676 949939 task_signals.go:204] [ 48801: 48807] Signal 48801, PID: 48807, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:40.323853 949939 task_exit.go:204] [ 48801: 48807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:40.323883 949939 usertrap_amd64.go:212] [ 48809: 48809] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:40.323997 949939 usertrap_amd64.go:122] [ 48809: 48809] Allocate a new trap: 0xc0066f3d70 40 D0620 03:40:40.325300 949939 usertrap_amd64.go:225] [ 48809: 48809] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:40.327566 949939 usertrap_amd64.go:212] [ 48810: 48810] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:40.327683 949939 usertrap_amd64.go:122] [ 48810: 48810] Allocate a new trap: 0xc002b2eba0 40 D0620 03:40:40.329358 949939 usertrap_amd64.go:225] [ 48810: 48810] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:40.329338 949939 task_exit.go:204] [ 48801: 48807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:40.330168 949939 task_exit.go:204] [ 48801: 48807] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:40.330338 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:40.330639 949939 task_exit.go:204] [ 48801: 48801] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:40 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r0 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) (async) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240), 0x4, 0x0) (async) fallocate(r0, 0x6f, 0x1, 0x45) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) D0620 03:40:40.332094 949939 usertrap_amd64.go:212] [ 48809: 48809] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:40.332200 949939 usertrap_amd64.go:122] [ 48809: 48809] Allocate a new trap: 0xc0066f3d70 41 D0620 03:40:40.332300 949939 usertrap_amd64.go:225] [ 48809: 48809] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:40.333646 949939 usertrap_amd64.go:212] [ 48808: 48808] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:40.333703 949939 usertrap_amd64.go:122] [ 48808: 48808] Allocate a new trap: 0xc001a6f080 42 D0620 03:40:40.333774 949939 usertrap_amd64.go:225] [ 48808: 48808] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:40.336566 949939 usertrap_amd64.go:212] [ 48810: 48810] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:40.336703 949939 usertrap_amd64.go:122] [ 48810: 48810] Allocate a new trap: 0xc002b2eba0 41 D0620 03:40:40.336806 949939 usertrap_amd64.go:225] [ 48810: 48810] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:40.380783 949939 usertrap_amd64.go:212] [ 48810: 48810] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:40.380903 949939 usertrap_amd64.go:122] [ 48810: 48810] Allocate a new trap: 0xc002b2eba0 42 D0620 03:40:40.381063 949939 usertrap_amd64.go:225] [ 48810: 48810] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:40.383807 949939 usertrap_amd64.go:212] [ 48809: 48809] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:40.383871 949939 usertrap_amd64.go:122] [ 48809: 48809] Allocate a new trap: 0xc0066f3d70 42 D0620 03:40:40.383928 949939 usertrap_amd64.go:225] [ 48809: 48809] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:40.451899 949939 usertrap_amd64.go:212] [ 48808: 48808] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:40.452044 949939 usertrap_amd64.go:122] [ 48808: 48808] Allocate a new trap: 0xc001a6f080 43 D0620 03:40:40.452157 949939 usertrap_amd64.go:225] [ 48808: 48808] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:40.453411 949939 usertrap_amd64.go:212] [ 48813: 48813] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:40.453511 949939 usertrap_amd64.go:122] [ 48813: 48813] Allocate a new trap: 0xc00037fbf0 40 D0620 03:40:40.890269 949939 usertrap_amd64.go:225] [ 48813: 48813] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:41.300554 949939 usertrap_amd64.go:212] [ 48808: 48808] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:41.300661 949939 usertrap_amd64.go:122] [ 48808: 48808] Allocate a new trap: 0xc001a6f080 44 D0620 03:40:41.300749 949939 usertrap_amd64.go:225] [ 48808: 48808] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:41.301300 949939 usertrap_amd64.go:212] [ 48809: 48809] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:41.301408 949939 usertrap_amd64.go:122] [ 48809: 48809] Allocate a new trap: 0xc0066f3d70 43 D0620 03:40:41.301526 949939 usertrap_amd64.go:225] [ 48809: 48809] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:41.308040 949939 usertrap_amd64.go:212] [ 48810: 48810] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:41.308193 949939 usertrap_amd64.go:122] [ 48810: 48810] Allocate a new trap: 0xc002b2eba0 43 D0620 03:40:41.308294 949939 usertrap_amd64.go:225] [ 48810: 48810] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:41.310407 949939 usertrap_amd64.go:212] [ 48813: 48813] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:41.310551 949939 usertrap_amd64.go:122] [ 48813: 48813] Allocate a new trap: 0xc00037fbf0 41 D0620 03:40:41.310663 949939 usertrap_amd64.go:225] [ 48813: 48813] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:41.317195 949939 task_exit.go:204] [ 48809: 48809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.317529 949939 task_signals.go:204] [ 48809: 48814] Signal 48809, PID: 48814, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.317572 949939 task_exit.go:204] [ 48809: 48809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.317824 949939 task_signals.go:204] [ 48809: 48818] Signal 48809, PID: 48818, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.317900 949939 task_exit.go:204] [ 48809: 48814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.318683 949939 task_exit.go:204] [ 48809: 48818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.318911 949939 task_signals.go:204] [ 48808: 48812] Signal 48808, PID: 48812, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.319101 949939 task_exit.go:204] [ 48808: 48812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.319346 949939 task_signals.go:204] [ 48808: 48816] Signal 48808, PID: 48816, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.319529 949939 task_signals.go:204] [ 48808: 48811] Signal 48808, PID: 48811, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.319666 949939 task_exit.go:204] [ 48808: 48812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.319723 949939 task_exit.go:204] [ 48808: 48812] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.319998 949939 task_exit.go:204] [ 48809: 48818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.320070 949939 task_exit.go:204] [ 48809: 48818] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.321134 949939 task_exit.go:204] [ 48808: 48808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.321311 949939 task_exit.go:204] [ 48808: 48816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.321956 949939 task_exit.go:204] [ 48808: 48811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.322320 949939 task_exit.go:204] [ 48808: 48816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.322488 949939 task_exit.go:204] [ 48808: 48816] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.322768 949939 task_exit.go:204] [ 48808: 48808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.350925 949939 usertrap_amd64.go:212] [ 48810: 48810] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:41.351238 949939 usertrap_amd64.go:122] [ 48810: 48810] Allocate a new trap: 0xc002b2eba0 44 D0620 03:40:41.351368 949939 usertrap_amd64.go:225] [ 48810: 48810] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:41.356936 949939 task_exit.go:204] [ 48809: 48814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.357333 949939 task_exit.go:204] [ 48809: 48814] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.357492 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:41.362764 949939 task_exit.go:204] [ 48809: 48809] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:41 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f00000000c0)='./file0/file1\x00', 0x10000, 0x121) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) fchmod(r1, 0x90) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:41.366963 949939 task_exit.go:204] [ 48808: 48811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.367094 949939 task_exit.go:204] [ 48808: 48811] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.367237 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:41.367791 949939 usertrap_amd64.go:212] [ 48813: 48813] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:41.367898 949939 usertrap_amd64.go:122] [ 48813: 48813] Allocate a new trap: 0xc00037fbf0 42 D0620 03:40:41.367978 949939 usertrap_amd64.go:225] [ 48813: 48813] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:41.368217 949939 task_exit.go:204] [ 48808: 48808] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.368527 949939 task_signals.go:204] [ 48810: 48815] Signal 48810, PID: 48815, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.368685 949939 task_signals.go:204] [ 48810: 48817] Signal 48810, PID: 48817, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.368748 949939 task_exit.go:204] [ 48810: 48810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.368990 949939 task_exit.go:204] [ 48810: 48815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.369445 949939 task_signals.go:204] [ 48810: 48819] Signal 48810, PID: 48819, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.369912 949939 task_exit.go:204] [ 48810: 48810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.370234 949939 task_exit.go:204] [ 48810: 48815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.370322 949939 task_exit.go:204] [ 48810: 48815] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 64) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async, rerun: 32) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x9, 0xa2, 0x4, 0x0, 0x6ccd, 0x88182, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0xc, 0xffffffff, 0x1, 0x7, 0x8, 0x7, 0x0, 0x0, 0x31f, 0x0, 0x8}, 0x0, 0x7, r0, 0x2) (rerun: 32) dup2(r2, r3) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) (async) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'tunl0\x00', 0x100}) D0620 03:40:41.370489 949939 task_exit.go:204] [ 48810: 48817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.370741 949939 task_exit.go:204] [ 48810: 48817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.370820 949939 task_exit.go:204] [ 48810: 48817] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.370914 949939 task_exit.go:204] [ 48810: 48819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.376229 949939 task_exit.go:204] [ 48810: 48819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.376340 949939 task_exit.go:204] [ 48810: 48819] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.376432 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:41.377066 949939 task_exit.go:204] [ 48810: 48810] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:41 executing program 3: r0 = open(&(0x7f0000000240)='./file1\x00', 0x105042, 0xc) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x3) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) openat$incfs(r1, &(0x7f0000000200)='.pending_reads\x00', 0x2400, 0x4d) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) (async) setxattr$incfs_size(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180), &(0x7f00000001c0)=0x4, 0x8, 0x1) D0620 03:40:41.438556 949939 usertrap_amd64.go:212] [ 48813: 48813] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:41.438741 949939 usertrap_amd64.go:122] [ 48813: 48813] Allocate a new trap: 0xc00037fbf0 43 D0620 03:40:41.438861 949939 usertrap_amd64.go:225] [ 48813: 48813] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:41.443427 949939 task_exit.go:204] [ 48813: 48813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.443891 949939 task_exit.go:204] [ 48813: 48813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.443834 949939 task_signals.go:204] [ 48813: 48820] Signal 48813, PID: 48820, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.444044 949939 task_exit.go:204] [ 48813: 48820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.444047 949939 task_signals.go:204] [ 48813: 48821] Signal 48813, PID: 48821, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:41.444257 949939 task_exit.go:204] [ 48813: 48821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:41.445259 949939 task_exit.go:204] [ 48813: 48820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.445325 949939 task_exit.go:204] [ 48813: 48820] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.451591 949939 task_exit.go:204] [ 48813: 48821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:41.452224 949939 task_exit.go:204] [ 48813: 48821] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:41.452555 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:41.454147 949939 task_exit.go:204] [ 48813: 48813] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:41 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r0 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240), 0x4, 0x0) (async) fallocate(r0, 0x6f, 0x1, 0x45) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) D0620 03:40:41.459046 949939 usertrap_amd64.go:212] [ 48822: 48822] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:41.459181 949939 usertrap_amd64.go:122] [ 48822: 48822] Allocate a new trap: 0xc01f00e060 40 D0620 03:40:41.462232 949939 usertrap_amd64.go:212] [ 48824: 48824] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:41.462354 949939 usertrap_amd64.go:122] [ 48824: 48824] Allocate a new trap: 0xc009c86090 40 D0620 03:40:41.462945 949939 usertrap_amd64.go:225] [ 48824: 48824] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:41.468206 949939 usertrap_amd64.go:212] [ 48824: 48824] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:41.468287 949939 usertrap_amd64.go:122] [ 48824: 48824] Allocate a new trap: 0xc009c86090 41 D0620 03:40:41.468382 949939 usertrap_amd64.go:225] [ 48824: 48824] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:41.468559 949939 usertrap_amd64.go:212] [ 48823: 48823] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:41.468742 949939 usertrap_amd64.go:122] [ 48823: 48823] Allocate a new trap: 0xc009c86060 40 D0620 03:40:41.469319 949939 usertrap_amd64.go:225] [ 48822: 48822] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:41.469552 949939 usertrap_amd64.go:225] [ 48823: 48823] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:41.473212 949939 usertrap_amd64.go:212] [ 48822: 48822] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:41.473328 949939 usertrap_amd64.go:122] [ 48822: 48822] Allocate a new trap: 0xc01f00e060 41 D0620 03:40:41.473438 949939 usertrap_amd64.go:225] [ 48822: 48822] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:41.477196 949939 usertrap_amd64.go:212] [ 48823: 48823] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:41.477297 949939 usertrap_amd64.go:122] [ 48823: 48823] Allocate a new trap: 0xc009c86060 41 D0620 03:40:41.477385 949939 usertrap_amd64.go:225] [ 48823: 48823] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:41.495019 949939 usertrap_amd64.go:212] [ 48824: 48824] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:41.495184 949939 usertrap_amd64.go:122] [ 48824: 48824] Allocate a new trap: 0xc009c86090 42 D0620 03:40:41.495305 949939 usertrap_amd64.go:225] [ 48824: 48824] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:41.498490 949939 usertrap_amd64.go:212] [ 48825: 48825] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:41.498622 949939 usertrap_amd64.go:122] [ 48825: 48825] Allocate a new trap: 0xc001a6e000 40 D0620 03:40:41.499181 949939 usertrap_amd64.go:225] [ 48825: 48825] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:41.499373 949939 usertrap_amd64.go:212] [ 48822: 48822] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:41.499491 949939 usertrap_amd64.go:122] [ 48822: 48822] Allocate a new trap: 0xc01f00e060 42 D0620 03:40:41.499590 949939 usertrap_amd64.go:225] [ 48822: 48822] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:41.507381 949939 usertrap_amd64.go:212] [ 48825: 48825] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:41.507618 949939 usertrap_amd64.go:122] [ 48825: 48825] Allocate a new trap: 0xc001a6e000 41 D0620 03:40:41.507765 949939 usertrap_amd64.go:225] [ 48825: 48825] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:42.377160 949939 usertrap_amd64.go:212] [ 48823: 48823] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:42.377278 949939 usertrap_amd64.go:122] [ 48823: 48823] Allocate a new trap: 0xc009c86060 42 D0620 03:40:42.377638 949939 usertrap_amd64.go:225] [ 48823: 48823] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:42.379872 949939 usertrap_amd64.go:212] [ 48824: 48824] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:42.379979 949939 usertrap_amd64.go:122] [ 48824: 48824] Allocate a new trap: 0xc009c86090 43 D0620 03:40:42.380089 949939 usertrap_amd64.go:225] [ 48824: 48824] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:42.383888 949939 usertrap_amd64.go:212] [ 48822: 48822] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:42.383972 949939 usertrap_amd64.go:122] [ 48822: 48822] Allocate a new trap: 0xc01f00e060 43 D0620 03:40:42.384069 949939 usertrap_amd64.go:225] [ 48822: 48822] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:42.387113 949939 task_exit.go:204] [ 48824: 48824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.387387 949939 task_signals.go:204] [ 48824: 48827] Signal 48824, PID: 48827, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.387492 949939 task_signals.go:204] [ 48824: 48829] Signal 48824, PID: 48829, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.387544 949939 task_exit.go:204] [ 48824: 48827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.387680 949939 task_signals.go:204] [ 48824: 48826] Signal 48824, PID: 48826, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.387763 949939 task_exit.go:204] [ 48824: 48826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.387778 949939 task_signals.go:204] [ 48824: 48831] Signal 48824, PID: 48831, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.387905 949939 task_exit.go:204] [ 48824: 48829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.388100 949939 task_exit.go:204] [ 48824: 48829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.388153 949939 task_exit.go:204] [ 48824: 48829] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.388281 949939 task_exit.go:204] [ 48824: 48831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.388761 949939 task_exit.go:204] [ 48824: 48827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.388834 949939 task_exit.go:204] [ 48824: 48827] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.389044 949939 task_exit.go:204] [ 48824: 48831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.389240 949939 task_exit.go:204] [ 48824: 48831] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.389508 949939 task_exit.go:204] [ 48824: 48826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.389589 949939 task_exit.go:204] [ 48824: 48826] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.396779 949939 task_exit.go:204] [ 48822: 48822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.397091 949939 task_signals.go:204] [ 48822: 48830] Signal 48822, PID: 48830, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.397023 949939 task_signals.go:204] [ 48822: 48832] Signal 48822, PID: 48832, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.397223 949939 task_exit.go:204] [ 48822: 48822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.397199 949939 task_signals.go:204] [ 48822: 48828] Signal 48822, PID: 48828, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.397418 949939 task_exit.go:204] [ 48822: 48830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.397511 949939 task_exit.go:204] [ 48822: 48828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.397731 949939 task_exit.go:204] [ 48822: 48828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.397854 949939 task_exit.go:204] [ 48822: 48828] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.398036 949939 task_exit.go:204] [ 48822: 48832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.398677 949939 task_exit.go:204] [ 48822: 48830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.398805 949939 task_exit.go:204] [ 48822: 48830] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.404847 949939 task_exit.go:204] [ 48822: 48832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.404930 949939 task_exit.go:204] [ 48822: 48832] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.405127 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:42.405252 949939 task_exit.go:204] [ 48822: 48822] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:42 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f00000000c0)='./file0/file1\x00', 0x10000, 0x121) fallocate(r0, 0x0, 0x0, 0x21d42a8a) r1 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) fchmod(r1, 0x90) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) open(&(0x7f00000000c0)='./file0/file1\x00', 0x10000, 0x121) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) ioctl$FIONCLEX(r1, 0x5450) (async) fchmod(r1, 0x90) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) D0620 03:40:42.408144 949939 task_exit.go:204] [ 48824: 48824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.408294 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:42.409020 949939 task_exit.go:204] [ 48824: 48824] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.412851 949939 usertrap_amd64.go:212] [ 48825: 48825] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:42.412976 949939 usertrap_amd64.go:122] [ 48825: 48825] Allocate a new trap: 0xc001a6e000 42 03:40:42 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() tkill(r1, 0x401004000000016) prlimit64(r1, 0xc, &(0x7f0000000200)={0x4}, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000000)='./bus\x00', &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)={'#&&'}, 0x4, 0x3) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:42.413060 949939 usertrap_amd64.go:225] [ 48825: 48825] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:42.489110 949939 usertrap_amd64.go:212] [ 48825: 48825] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:42.489208 949939 usertrap_amd64.go:122] [ 48825: 48825] Allocate a new trap: 0xc001a6e000 43 D0620 03:40:42.489290 949939 usertrap_amd64.go:225] [ 48825: 48825] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:42.499281 949939 task_exit.go:204] [ 48825: 48825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.499573 949939 task_exit.go:204] [ 48825: 48825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.499806 949939 task_signals.go:204] [ 48825: 48835] Signal 48825, PID: 48835, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.499966 949939 task_signals.go:204] [ 48825: 48836] Signal 48825, PID: 48836, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.500068 949939 task_exit.go:204] [ 48825: 48835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.500432 949939 task_signals.go:204] [ 48825: 48838] Signal 48825, PID: 48838, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.500606 949939 task_exit.go:204] [ 48825: 48835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.500650 949939 task_exit.go:204] [ 48825: 48835] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.500892 949939 task_exit.go:204] [ 48825: 48836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.501184 949939 task_exit.go:204] [ 48825: 48838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.501425 949939 task_exit.go:204] [ 48825: 48836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.501494 949939 task_exit.go:204] [ 48825: 48836] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.506173 949939 task_exit.go:204] [ 48825: 48838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.506289 949939 task_exit.go:204] [ 48825: 48838] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.506417 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:42.507056 949939 task_exit.go:204] [ 48825: 48825] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:42 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x4) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x8306de09d1cd3110, 0x2, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setrlimit(0xe, &(0x7f0000000140)={0x22d, 0x8}) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x0, 0x100) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x8, 0xf8, 0x1, 0x1aef}]}, 0x10) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r0}, 0x4, &(0x7f00000000c0)=[0x10000, 0x8, 0x7, 0x84], 0x0, 0x0, 0x1}) D0620 03:40:42.509553 949939 usertrap_amd64.go:212] [ 48837: 48837] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:42.509661 949939 usertrap_amd64.go:122] [ 48837: 48837] Allocate a new trap: 0xc0093ae0c0 40 D0620 03:40:42.510561 949939 usertrap_amd64.go:225] [ 48837: 48837] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:42.515542 949939 usertrap_amd64.go:212] [ 48837: 48837] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:42.515605 949939 usertrap_amd64.go:122] [ 48837: 48837] Allocate a new trap: 0xc0093ae0c0 41 D0620 03:40:42.515668 949939 usertrap_amd64.go:225] [ 48837: 48837] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:42.520147 949939 usertrap_amd64.go:212] [ 48839: 48839] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:42.520297 949939 usertrap_amd64.go:122] [ 48839: 48839] Allocate a new trap: 0xc00945e090 40 D0620 03:40:42.520985 949939 usertrap_amd64.go:225] [ 48839: 48839] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:42.526526 949939 usertrap_amd64.go:212] [ 48839: 48839] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:42.526662 949939 usertrap_amd64.go:122] [ 48839: 48839] Allocate a new trap: 0xc00945e090 41 D0620 03:40:42.526766 949939 usertrap_amd64.go:225] [ 48839: 48839] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:42.542425 949939 usertrap_amd64.go:212] [ 48837: 48837] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:42.542535 949939 usertrap_amd64.go:122] [ 48837: 48837] Allocate a new trap: 0xc0093ae0c0 42 D0620 03:40:42.542659 949939 usertrap_amd64.go:225] [ 48837: 48837] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:42.546276 949939 usertrap_amd64.go:212] [ 48823: 48823] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:42.546380 949939 usertrap_amd64.go:122] [ 48823: 48823] Allocate a new trap: 0xc009c86060 43 D0620 03:40:42.546448 949939 usertrap_amd64.go:225] [ 48823: 48823] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:42.550214 949939 usertrap_amd64.go:212] [ 48839: 48839] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:42.550352 949939 usertrap_amd64.go:122] [ 48839: 48839] Allocate a new trap: 0xc00945e090 42 D0620 03:40:42.550491 949939 usertrap_amd64.go:225] [ 48839: 48839] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:42.556905 949939 task_signals.go:470] [ 48839: 48843] Notified of signal 22 D0620 03:40:42.557087 949939 task_signals.go:808] [ 48839: 48843] Signal 22: stopping 2 threads in thread group D0620 03:40:42.557152 949939 task_stop.go:118] [ 48839: 48843] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:42.557305 949939 task_signals.go:885] [ 48839: 48839] Completing group stop D0620 03:40:42.557452 949939 task_stop.go:118] [ 48839: 48839] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:42.557547 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:42.560083 949939 usertrap_amd64.go:212] [ 48841: 48841] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:42.560177 949939 usertrap_amd64.go:122] [ 48841: 48841] Allocate a new trap: 0xc003084000 40 D0620 03:40:42.560760 949939 usertrap_amd64.go:225] [ 48841: 48841] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:42.632310 949939 usertrap_amd64.go:212] [ 48841: 48841] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:42.632425 949939 usertrap_amd64.go:122] [ 48841: 48841] Allocate a new trap: 0xc003084000 41 D0620 03:40:42.632545 949939 usertrap_amd64.go:225] [ 48841: 48841] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:42.648380 949939 usertrap_amd64.go:212] [ 48823: 48823] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:42.648514 949939 usertrap_amd64.go:122] [ 48823: 48823] Allocate a new trap: 0xc009c86060 44 D0620 03:40:42.648575 949939 usertrap_amd64.go:225] [ 48823: 48823] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:42.654786 949939 task_exit.go:204] [ 48823: 48823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.655227 949939 task_signals.go:204] [ 48823: 48834] Signal 48823, PID: 48834, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.655385 949939 task_signals.go:204] [ 48823: 48833] Signal 48823, PID: 48833, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.655450 949939 task_signals.go:204] [ 48823: 48840] Signal 48823, PID: 48840, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:42.655515 949939 task_exit.go:204] [ 48823: 48823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.655794 949939 task_exit.go:204] [ 48823: 48840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.656038 949939 task_exit.go:204] [ 48823: 48840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.656077 949939 task_exit.go:204] [ 48823: 48840] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.656219 949939 task_exit.go:204] [ 48823: 48834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.656487 949939 task_exit.go:204] [ 48823: 48833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:42.656836 949939 task_exit.go:204] [ 48823: 48834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.656977 949939 task_exit.go:204] [ 48823: 48834] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.667446 949939 task_exit.go:204] [ 48823: 48833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:42.667689 949939 task_exit.go:204] [ 48823: 48833] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:42.667979 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:42.669267 949939 task_exit.go:204] [ 48823: 48823] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x800) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r3, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r3, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x13, r3, 0x741f7000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000100)={0x4}) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) fchdir(r2) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r5, 0x5450, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000), 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KIOCSOUND(r6, 0x4b2f, 0x6) D0620 03:40:42.749681 949939 usertrap_amd64.go:212] [ 48837: 48837] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:42.749749 949939 usertrap_amd64.go:122] [ 48837: 48837] Allocate a new trap: 0xc0093ae0c0 43 D0620 03:40:42.749840 949939 usertrap_amd64.go:225] [ 48837: 48837] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:43.046662 949939 usertrap_amd64.go:212] [ 48837: 48837] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:43.046761 949939 usertrap_amd64.go:122] [ 48837: 48837] Allocate a new trap: 0xc0093ae0c0 44 D0620 03:40:43.046838 949939 usertrap_amd64.go:225] [ 48837: 48837] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:43.054242 949939 task_exit.go:204] [ 48837: 48837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.054755 949939 task_signals.go:204] [ 48837: 48844] Signal 48837, PID: 48844, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.054870 949939 task_signals.go:204] [ 48837: 48847] Signal 48837, PID: 48847, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.054871 949939 task_signals.go:204] [ 48837: 48851] Signal 48837, PID: 48851, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.054766 949939 task_signals.go:204] [ 48837: 48850] Signal 48837, PID: 48850, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.054962 949939 task_signals.go:204] [ 48837: 48852] Signal 48837, PID: 48852, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.055159 949939 task_signals.go:204] [ 48837: 48845] Signal 48837, PID: 48845, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.055300 949939 task_signals.go:204] [ 48837: 48842] Signal 48837, PID: 48842, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.055309 949939 task_signals.go:204] [ 48837: 48848] Signal 48837, PID: 48848, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.055397 949939 task_signals.go:204] [ 48837: 48846] Signal 48837, PID: 48846, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.055442 949939 task_exit.go:204] [ 48837: 48845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.055241 949939 task_signals.go:204] [ 48837: 48849] Signal 48837, PID: 48849, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.055619 949939 task_exit.go:204] [ 48837: 48844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.055865 949939 task_exit.go:204] [ 48837: 48847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.056086 949939 task_exit.go:204] [ 48837: 48851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.056352 949939 task_exit.go:204] [ 48837: 48851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.056558 949939 task_exit.go:204] [ 48837: 48851] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.056836 949939 task_exit.go:204] [ 48837: 48850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.057175 949939 task_exit.go:204] [ 48837: 48850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.057230 949939 task_exit.go:204] [ 48837: 48850] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.057367 949939 task_exit.go:204] [ 48837: 48852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.057572 949939 task_exit.go:204] [ 48837: 48852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.057640 949939 task_exit.go:204] [ 48837: 48852] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.057754 949939 task_exit.go:204] [ 48837: 48842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.057825 949939 task_exit.go:204] [ 48837: 48849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.057915 949939 task_exit.go:204] [ 48837: 48848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.058144 949939 task_exit.go:204] [ 48837: 48846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.058616 949939 task_exit.go:204] [ 48837: 48837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.058755 949939 task_exit.go:204] [ 48837: 48849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.058821 949939 task_exit.go:204] [ 48837: 48849] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.059001 949939 task_exit.go:204] [ 48837: 48844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.059086 949939 task_exit.go:204] [ 48837: 48844] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.059269 949939 task_exit.go:204] [ 48837: 48842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.059336 949939 task_exit.go:204] [ 48837: 48842] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.059580 949939 task_exit.go:204] [ 48837: 48847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.059643 949939 task_exit.go:204] [ 48837: 48847] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.059796 949939 task_exit.go:204] [ 48837: 48848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.059852 949939 task_exit.go:204] [ 48837: 48848] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.060139 949939 task_exit.go:204] [ 48837: 48845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.060207 949939 task_exit.go:204] [ 48837: 48845] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.069066 949939 task_exit.go:204] [ 48837: 48846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.069184 949939 task_exit.go:204] [ 48837: 48846] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.069282 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:43.069448 949939 task_exit.go:204] [ 48837: 48837] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:43 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) open(&(0x7f00000000c0)='./file0/file1\x00', 0x10000, 0x121) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) r1 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) fchmod(r1, 0x90) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:43.073374 949939 usertrap_amd64.go:212] [ 48841: 48841] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:43.073460 949939 usertrap_amd64.go:122] [ 48841: 48841] Allocate a new trap: 0xc003084000 42 D0620 03:40:43.073555 949939 usertrap_amd64.go:225] [ 48841: 48841] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:43.141117 949939 usertrap_amd64.go:212] [ 48853: 48853] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:43.141245 949939 usertrap_amd64.go:122] [ 48853: 48853] Allocate a new trap: 0xc002b2e3f0 40 D0620 03:40:43.142045 949939 usertrap_amd64.go:225] [ 48853: 48853] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:43.145368 949939 usertrap_amd64.go:212] [ 48841: 48841] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:43.145493 949939 usertrap_amd64.go:122] [ 48841: 48841] Allocate a new trap: 0xc003084000 43 D0620 03:40:43.145498 949939 usertrap_amd64.go:212] [ 48853: 48853] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:43.145609 949939 usertrap_amd64.go:122] [ 48853: 48853] Allocate a new trap: 0xc002b2e3f0 41 D0620 03:40:43.145736 949939 usertrap_amd64.go:225] [ 48853: 48853] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:43.145924 949939 usertrap_amd64.go:225] [ 48841: 48841] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:43.152780 949939 task_exit.go:204] [ 48841: 48841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.153128 949939 task_exit.go:204] [ 48841: 48841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.153110 949939 task_signals.go:204] [ 48841: 48854] Signal 48841, PID: 48854, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.153308 949939 task_exit.go:204] [ 48841: 48854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.158316 949939 task_exit.go:204] [ 48841: 48854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.158423 949939 task_exit.go:204] [ 48841: 48854] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.158521 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:43.158835 949939 task_exit.go:204] [ 48841: 48841] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:43 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x4) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x8306de09d1cd3110, 0x2, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setrlimit(0xe, &(0x7f0000000140)={0x22d, 0x8}) (async, rerun: 32) chdir(&(0x7f0000000040)='./file0\x00') (async, rerun: 32) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x0, 0x100) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x8, 0xf8, 0x1, 0x1aef}]}, 0x10) (async, rerun: 32) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r0}, 0x4, &(0x7f00000000c0)=[0x10000, 0x8, 0x7, 0x84], 0x0, 0x0, 0x1}) (rerun: 32) D0620 03:40:43.171553 949939 usertrap_amd64.go:212] [ 48853: 48853] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:43.171674 949939 usertrap_amd64.go:122] [ 48853: 48853] Allocate a new trap: 0xc002b2e3f0 42 D0620 03:40:43.171780 949939 usertrap_amd64.go:225] [ 48853: 48853] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:43.173890 949939 usertrap_amd64.go:212] [ 48855: 48855] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:43.174061 949939 usertrap_amd64.go:122] [ 48855: 48855] Allocate a new trap: 0xc003084150 40 D0620 03:40:43.174699 949939 usertrap_amd64.go:225] [ 48855: 48855] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:43.176801 949939 usertrap_amd64.go:212] [ 48855: 48855] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:43.176879 949939 usertrap_amd64.go:122] [ 48855: 48855] Allocate a new trap: 0xc003084150 41 D0620 03:40:43.177004 949939 usertrap_amd64.go:225] [ 48855: 48855] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:43.202334 949939 usertrap_amd64.go:212] [ 48855: 48855] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:43.202467 949939 usertrap_amd64.go:122] [ 48855: 48855] Allocate a new trap: 0xc003084150 42 D0620 03:40:43.202828 949939 usertrap_amd64.go:225] [ 48855: 48855] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:43.206777 949939 usertrap_amd64.go:212] [ 48857: 48857] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:43.206895 949939 usertrap_amd64.go:122] [ 48857: 48857] Allocate a new trap: 0xc0021b4300 40 D0620 03:40:43.207859 949939 usertrap_amd64.go:225] [ 48857: 48857] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:43.211995 949939 usertrap_amd64.go:212] [ 48857: 48857] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:43.212080 949939 usertrap_amd64.go:122] [ 48857: 48857] Allocate a new trap: 0xc0021b4300 41 D0620 03:40:43.212152 949939 usertrap_amd64.go:225] [ 48857: 48857] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:43.228280 949939 usertrap_amd64.go:212] [ 48857: 48857] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:43.228372 949939 usertrap_amd64.go:122] [ 48857: 48857] Allocate a new trap: 0xc0021b4300 42 D0620 03:40:43.228432 949939 usertrap_amd64.go:225] [ 48857: 48857] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:43.243187 949939 usertrap_amd64.go:212] [ 48857: 48857] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:43.243306 949939 usertrap_amd64.go:122] [ 48857: 48857] Allocate a new trap: 0xc0021b4300 43 D0620 03:40:43.243399 949939 usertrap_amd64.go:225] [ 48857: 48857] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:43.245406 949939 usertrap_amd64.go:212] [ 48857: 48857] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:43.245518 949939 usertrap_amd64.go:122] [ 48857: 48857] Allocate a new trap: 0xc0021b4300 44 D0620 03:40:43.245644 949939 usertrap_amd64.go:225] [ 48857: 48857] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:43.248760 949939 task_exit.go:204] [ 48857: 48857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.249230 949939 task_signals.go:204] [ 48857: 48863] Signal 48857, PID: 48863, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.249233 949939 task_signals.go:204] [ 48857: 48865] Signal 48857, PID: 48865, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.249311 949939 task_signals.go:204] [ 48857: 48862] Signal 48857, PID: 48862, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.249229 949939 task_signals.go:204] [ 48857: 48864] Signal 48857, PID: 48864, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.249321 949939 task_exit.go:204] [ 48857: 48857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.249835 949939 task_exit.go:204] [ 48857: 48863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.250148 949939 task_exit.go:204] [ 48857: 48863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.250232 949939 task_exit.go:204] [ 48857: 48863] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.250633 949939 task_exit.go:204] [ 48857: 48865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.250838 949939 task_exit.go:204] [ 48857: 48862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.251016 949939 task_exit.go:204] [ 48857: 48864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.251348 949939 task_exit.go:204] [ 48857: 48864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.251411 949939 task_exit.go:204] [ 48857: 48864] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.251585 949939 task_exit.go:204] [ 48857: 48865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.251646 949939 task_exit.go:204] [ 48857: 48865] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.258295 949939 task_exit.go:204] [ 48857: 48862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.258388 949939 task_exit.go:204] [ 48857: 48862] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.258566 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:43.258991 949939 task_exit.go:204] [ 48857: 48857] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:43 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x4) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x8306de09d1cd3110, 0x2, 0x21d42a8a) (async) fallocate(r0, 0x8306de09d1cd3110, 0x2, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setrlimit(0xe, &(0x7f0000000140)={0x22d, 0x8}) (async) setrlimit(0xe, &(0x7f0000000140)={0x22d, 0x8}) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus\x00', 0x0, 0x100) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x8, 0xf8, 0x1, 0x1aef}]}, 0x10) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r0}, 0x4, &(0x7f00000000c0)=[0x10000, 0x8, 0x7, 0x84], 0x0, 0x0, 0x1}) (async) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r0}, 0x4, &(0x7f00000000c0)=[0x10000, 0x8, 0x7, 0x84], 0x0, 0x0, 0x1}) D0620 03:40:43.271651 949939 usertrap_amd64.go:212] [ 48853: 48866] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:40:43.271758 949939 usertrap_amd64.go:122] [ 48853: 48866] Allocate a new trap: 0xc002b2e3f0 43 D0620 03:40:43.271841 949939 usertrap_amd64.go:225] [ 48853: 48866] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:43.275567 949939 usertrap_amd64.go:212] [ 48853: 48853] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:43.275705 949939 usertrap_amd64.go:122] [ 48853: 48853] Allocate a new trap: 0xc002b2e3f0 44 D0620 03:40:43.275774 949939 usertrap_amd64.go:225] [ 48853: 48853] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:43.323968 949939 usertrap_amd64.go:212] [ 48855: 48855] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:43.324087 949939 usertrap_amd64.go:122] [ 48855: 48855] Allocate a new trap: 0xc003084150 43 D0620 03:40:43.324213 949939 usertrap_amd64.go:225] [ 48855: 48855] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:43.685524 949939 usertrap_amd64.go:212] [ 48855: 48855] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:43.685655 949939 usertrap_amd64.go:122] [ 48855: 48855] Allocate a new trap: 0xc003084150 44 D0620 03:40:43.685813 949939 usertrap_amd64.go:225] [ 48855: 48855] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:43.692145 949939 task_exit.go:204] [ 48855: 48855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.692309 949939 task_signals.go:204] [ 48855: 48858] Signal 48855, PID: 48858, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.692409 949939 task_exit.go:204] [ 48855: 48855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.692502 949939 task_signals.go:204] [ 48855: 48859] Signal 48855, PID: 48859, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.692542 949939 task_signals.go:204] [ 48855: 48861] Signal 48855, PID: 48861, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.692601 949939 task_exit.go:204] [ 48855: 48858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.692771 949939 task_exit.go:204] [ 48855: 48859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.693080 949939 task_signals.go:204] [ 48855: 48860] Signal 48855, PID: 48860, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.693194 949939 task_exit.go:204] [ 48855: 48860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.693337 949939 task_exit.go:204] [ 48855: 48861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.693789 949939 task_exit.go:204] [ 48855: 48860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.693872 949939 task_exit.go:204] [ 48855: 48860] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.694089 949939 task_exit.go:204] [ 48855: 48858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.694151 949939 task_exit.go:204] [ 48855: 48858] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.694302 949939 task_exit.go:204] [ 48855: 48859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.694358 949939 task_exit.go:204] [ 48855: 48859] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.701628 949939 task_exit.go:204] [ 48855: 48861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.701721 949939 task_exit.go:204] [ 48855: 48861] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.701820 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:43.702334 949939 task_exit.go:204] [ 48855: 48855] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:43 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = inotify_init1(0x40000) dup2(r1, r0) setrlimit(0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f00000000c0)={0x7, {0x39, 0x7, 0x2, 0x4, 0x38000}}) fcntl$addseals(r0, 0x409, 0x1) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:43.772809 949939 usertrap_amd64.go:212] [ 48867: 48867] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:43.772911 949939 usertrap_amd64.go:122] [ 48867: 48867] Allocate a new trap: 0xc009c86270 40 D0620 03:40:43.774023 949939 usertrap_amd64.go:225] [ 48867: 48867] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:43.776553 949939 usertrap_amd64.go:212] [ 48867: 48867] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:43.776633 949939 usertrap_amd64.go:122] [ 48867: 48867] Allocate a new trap: 0xc009c86270 41 D0620 03:40:43.776722 949939 usertrap_amd64.go:225] [ 48867: 48867] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:43.795456 949939 usertrap_amd64.go:212] [ 48868: 48868] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:43.795610 949939 usertrap_amd64.go:122] [ 48868: 48868] Allocate a new trap: 0xc009c862a0 40 D0620 03:40:43.796333 949939 usertrap_amd64.go:225] [ 48868: 48868] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:43.803799 949939 usertrap_amd64.go:212] [ 48867: 48867] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:43.803914 949939 usertrap_amd64.go:122] [ 48867: 48867] Allocate a new trap: 0xc009c86270 42 D0620 03:40:43.804000 949939 usertrap_amd64.go:225] [ 48867: 48867] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:43.808100 949939 usertrap_amd64.go:212] [ 48868: 48868] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:43.808180 949939 usertrap_amd64.go:122] [ 48868: 48868] Allocate a new trap: 0xc009c862a0 41 D0620 03:40:43.808236 949939 usertrap_amd64.go:225] [ 48868: 48868] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:43.824316 949939 usertrap_amd64.go:212] [ 48867: 48867] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:43.824431 949939 usertrap_amd64.go:122] [ 48867: 48867] Allocate a new trap: 0xc009c86270 43 D0620 03:40:43.824520 949939 usertrap_amd64.go:225] [ 48867: 48867] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:43.826803 949939 usertrap_amd64.go:212] [ 48868: 48868] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:43.826880 949939 usertrap_amd64.go:122] [ 48868: 48868] Allocate a new trap: 0xc009c862a0 42 D0620 03:40:43.826975 949939 usertrap_amd64.go:225] [ 48868: 48868] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:43.828015 949939 usertrap_amd64.go:212] [ 48867: 48867] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:43.828103 949939 usertrap_amd64.go:122] [ 48867: 48867] Allocate a new trap: 0xc009c86270 44 D0620 03:40:43.828210 949939 usertrap_amd64.go:225] [ 48867: 48867] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:43.833062 949939 task_signals.go:470] [ 48868: 48871] Notified of signal 25 D0620 03:40:43.833386 949939 task_signals.go:204] [ 48868: 48871] Signal 48868, PID: 48871, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:43.833528 949939 task_signals.go:204] [ 48868: 48868] Signal 48868, PID: 48868, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.833565 949939 task_exit.go:204] [ 48868: 48871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.833692 949939 task_exit.go:204] [ 48868: 48868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.834042 949939 task_exit.go:204] [ 48868: 48868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.837845 949939 task_exit.go:204] [ 48868: 48871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.837962 949939 task_exit.go:204] [ 48868: 48871] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.838065 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:43.838937 949939 task_exit.go:204] [ 48868: 48868] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:43 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r1 = inotify_init1(0x40000) dup2(r1, r0) (async) setrlimit(0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f00000000c0)={0x7, {0x39, 0x7, 0x2, 0x4, 0x38000}}) (async) fcntl$addseals(r0, 0x409, 0x1) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:43.840487 949939 task_exit.go:204] [ 48867: 48867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.840934 949939 task_signals.go:204] [ 48867: 48869] Signal 48867, PID: 48869, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.840981 949939 task_signals.go:204] [ 48867: 48870] Signal 48867, PID: 48870, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.841381 949939 task_exit.go:204] [ 48867: 48867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.841605 949939 task_exit.go:204] [ 48867: 48870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.841820 949939 task_exit.go:204] [ 48867: 48870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.841871 949939 task_exit.go:204] [ 48867: 48870] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.842189 949939 task_exit.go:204] [ 48867: 48869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.847289 949939 task_exit.go:204] [ 48867: 48869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.847376 949939 task_exit.go:204] [ 48867: 48869] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.847462 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:43.847971 949939 task_exit.go:204] [ 48867: 48867] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.858318 949939 usertrap_amd64.go:212] [ 48872: 48872] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:43.858447 949939 usertrap_amd64.go:122] [ 48872: 48872] Allocate a new trap: 0xc009a008a0 40 D0620 03:40:43.858993 949939 usertrap_amd64.go:225] [ 48872: 48872] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:43.862140 949939 usertrap_amd64.go:212] [ 48872: 48872] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:43.862251 949939 usertrap_amd64.go:122] [ 48872: 48872] Allocate a new trap: 0xc009a008a0 41 D0620 03:40:43.862319 949939 usertrap_amd64.go:225] [ 48872: 48872] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:43.875926 949939 usertrap_amd64.go:212] [ 48872: 48872] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:43.876031 949939 usertrap_amd64.go:122] [ 48872: 48872] Allocate a new trap: 0xc009a008a0 42 D0620 03:40:43.876110 949939 usertrap_amd64.go:225] [ 48872: 48872] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:43.880733 949939 task_signals.go:470] [ 48872: 48873] Notified of signal 25 D0620 03:40:43.881256 949939 task_signals.go:204] [ 48872: 48873] Signal 48872, PID: 48873, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:43.881404 949939 task_exit.go:204] [ 48872: 48873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.881647 949939 task_signals.go:204] [ 48872: 48872] Signal 48872, PID: 48872, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.881770 949939 task_exit.go:204] [ 48872: 48873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.881824 949939 task_exit.go:204] [ 48872: 48873] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.881945 949939 task_signals.go:204] [ 48872: 48874] Signal 48872, PID: 48874, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.882206 949939 task_exit.go:204] [ 48872: 48872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.882426 949939 task_exit.go:204] [ 48872: 48874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.882766 949939 task_exit.go:204] [ 48872: 48872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.887834 949939 task_exit.go:204] [ 48872: 48874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.887915 949939 task_exit.go:204] [ 48872: 48874] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.888011 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:43.889282 949939 task_exit.go:204] [ 48872: 48872] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.995005 949939 usertrap_amd64.go:212] [ 48853: 48853] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:43.995135 949939 usertrap_amd64.go:122] [ 48853: 48853] Allocate a new trap: 0xc002b2e3f0 45 D0620 03:40:43.995247 949939 usertrap_amd64.go:225] [ 48853: 48853] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:40:43.997086 949939 task_exit.go:204] [ 48853: 48853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.997409 949939 task_exit.go:204] [ 48853: 48853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.997358 949939 task_signals.go:204] [ 48853: 48866] Signal 48853, PID: 48866, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.997586 949939 task_exit.go:204] [ 48853: 48866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:43.997565 949939 task_signals.go:204] [ 48853: 48856] Signal 48853, PID: 48856, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:43.997797 949939 task_exit.go:204] [ 48853: 48866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:43.997851 949939 task_exit.go:204] [ 48853: 48866] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:43.997991 949939 task_exit.go:204] [ 48853: 48856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:44.002754 949939 task_exit.go:204] [ 48853: 48856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:44.002877 949939 task_exit.go:204] [ 48853: 48856] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:44.003021 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:44.003170 949939 task_exit.go:204] [ 48853: 48853] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:45.493602 949939 task_stop.go:138] [ 48839: 48839] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:45.493772 949939 task_stop.go:138] [ 48839: 48843] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:45.493900 949939 task_signals.go:481] [ 48839: 48839] No task notified of signal 9 D0620 03:40:45.494109 949939 task_signals.go:458] [ 48839: 48839] Discarding duplicate signal 9 D0620 03:40:45.494119 949939 task_signals.go:204] [ 48839: 48843] Signal 48839, PID: 48843, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:45.494264 949939 task_exit.go:204] [ 48839: 48843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:45.494255 949939 task_signals.go:204] [ 48839: 48839] Signal 48839, PID: 48839, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:45.494480 949939 task_exit.go:204] [ 48839: 48839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:45.494619 949939 task_exit.go:204] [ 48839: 48843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:45.494695 949939 task_exit.go:204] [ 48839: 48843] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:45.499710 949939 task_exit.go:204] [ 48839: 48839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:45.499795 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:45.500057 949939 task_exit.go:204] [ 48839: 48839] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:45 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() tkill(r1, 0x401004000000016) prlimit64(r1, 0xc, &(0x7f0000000200)={0x4}, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000000)='./bus\x00', &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)={'#&&'}, 0x4, 0x3) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) gettid() (async) tkill(r1, 0x401004000000016) (async) prlimit64(r1, 0xc, &(0x7f0000000200)={0x4}, 0x0) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) (async) lsetxattr$smack_xattr_label(&(0x7f0000000000)='./bus\x00', &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)={'#&&'}, 0x4, 0x3) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) 03:40:45 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) removexattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=@random={'btrfs.', '----((%!{.*\x00'}) chdir(&(0x7f0000000040)='./file0\x00') 03:40:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x800) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r3, 0x0) (async) listen(r3, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r3, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x13, r3, 0x741f7000) (async) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x13, r3, 0x741f7000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000100)={0x4}) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) fchdir(r2) (async) fchdir(r2) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r5, 0x5450, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000), 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KIOCSOUND(r6, 0x4b2f, 0x6) D0620 03:40:45.502210 949939 task_signals.go:470] [ 7: 4632] Notified of signal 23 D0620 03:40:45.502426 949939 task_signals.go:220] [ 7: 4632] Signal 23: delivering to handler 03:40:45 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r1 = inotify_init1(0x40000) dup2(r1, r0) (async) setrlimit(0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f00000000c0)={0x7, {0x39, 0x7, 0x2, 0x4, 0x38000}}) fcntl$addseals(r0, 0x409, 0x1) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:45.520156 949939 usertrap_amd64.go:212] [ 48876: 48876] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:45.520259 949939 usertrap_amd64.go:122] [ 48876: 48876] Allocate a new trap: 0xc002b2e870 40 D0620 03:40:45.521100 949939 usertrap_amd64.go:212] [ 48877: 48877] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:45.521149 949939 usertrap_amd64.go:225] [ 48876: 48876] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:45.521271 949939 usertrap_amd64.go:122] [ 48877: 48877] Allocate a new trap: 0xc0066f2390 40 D0620 03:40:45.522700 949939 usertrap_amd64.go:225] [ 48877: 48877] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:45.524233 949939 usertrap_amd64.go:212] [ 48878: 48878] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:45.524341 949939 usertrap_amd64.go:122] [ 48878: 48878] Allocate a new trap: 0xc003084300 40 D0620 03:40:45.525467 949939 usertrap_amd64.go:225] [ 48878: 48878] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:45.525914 949939 usertrap_amd64.go:212] [ 48877: 48877] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:45.525981 949939 usertrap_amd64.go:122] [ 48877: 48877] Allocate a new trap: 0xc0066f2390 41 D0620 03:40:45.526194 949939 usertrap_amd64.go:225] [ 48877: 48877] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:45.529508 949939 usertrap_amd64.go:212] [ 48878: 48878] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:45.529639 949939 usertrap_amd64.go:122] [ 48878: 48878] Allocate a new trap: 0xc003084300 41 D0620 03:40:45.529470 949939 usertrap_amd64.go:212] [ 48875: 48875] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:45.529715 949939 usertrap_amd64.go:225] [ 48878: 48878] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:45.529813 949939 usertrap_amd64.go:122] [ 48875: 48875] Allocate a new trap: 0xc0030842d0 40 D0620 03:40:45.530476 949939 usertrap_amd64.go:225] [ 48875: 48875] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:45.531964 949939 usertrap_amd64.go:212] [ 48876: 48876] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:45.532040 949939 usertrap_amd64.go:122] [ 48876: 48876] Allocate a new trap: 0xc002b2e870 41 D0620 03:40:45.532119 949939 usertrap_amd64.go:225] [ 48876: 48876] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:45.533268 949939 usertrap_amd64.go:212] [ 48875: 48875] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:45.533334 949939 usertrap_amd64.go:122] [ 48875: 48875] Allocate a new trap: 0xc0030842d0 41 D0620 03:40:45.533384 949939 usertrap_amd64.go:225] [ 48875: 48875] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:45.546216 949939 usertrap_amd64.go:212] [ 48877: 48877] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:45.546351 949939 usertrap_amd64.go:122] [ 48877: 48877] Allocate a new trap: 0xc0066f2390 42 D0620 03:40:45.546432 949939 usertrap_amd64.go:225] [ 48877: 48877] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:45.549950 949939 usertrap_amd64.go:212] [ 48876: 48876] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:45.550090 949939 usertrap_amd64.go:122] [ 48876: 48876] Allocate a new trap: 0xc002b2e870 42 D0620 03:40:45.550204 949939 usertrap_amd64.go:225] [ 48876: 48876] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:45.554553 949939 usertrap_amd64.go:212] [ 48875: 48875] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:45.554646 949939 usertrap_amd64.go:122] [ 48875: 48875] Allocate a new trap: 0xc0030842d0 42 D0620 03:40:45.554725 949939 usertrap_amd64.go:225] [ 48875: 48875] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:45.562232 949939 usertrap_amd64.go:212] [ 48878: 48878] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:45.562334 949939 usertrap_amd64.go:122] [ 48878: 48878] Allocate a new trap: 0xc003084300 42 D0620 03:40:45.562400 949939 usertrap_amd64.go:225] [ 48878: 48878] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:45.562886 949939 task_signals.go:470] [ 48876: 48880] Notified of signal 25 D0620 03:40:45.563053 949939 task_signals.go:204] [ 48876: 48880] Signal 48876, PID: 48880, TID: 0, fault addr: 0x19: terminating thread group D0620 03:40:45.563149 949939 task_exit.go:204] [ 48876: 48880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:45.563359 949939 task_signals.go:204] [ 48876: 48882] Signal 48876, PID: 48882, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:45.563503 949939 task_exit.go:204] [ 48876: 48882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:45.563738 949939 task_signals.go:204] [ 48876: 48876] Signal 48876, PID: 48876, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:45.563776 949939 task_exit.go:204] [ 48876: 48882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:45.563850 949939 task_exit.go:204] [ 48876: 48882] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:45.564007 949939 task_exit.go:204] [ 48876: 48880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:45.564097 949939 task_exit.go:204] [ 48876: 48880] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:45.564201 949939 task_exit.go:204] [ 48876: 48876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:45.568614 949939 task_signals.go:470] [ 48878: 48884] Notified of signal 22 D0620 03:40:45.568792 949939 task_signals.go:808] [ 48878: 48884] Signal 22: stopping 2 threads in thread group D0620 03:40:45.568905 949939 task_stop.go:118] [ 48878: 48884] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:45.569044 949939 task_signals.go:885] [ 48878: 48878] Completing group stop D0620 03:40:45.569117 949939 task_stop.go:118] [ 48878: 48878] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:45.569184 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:45.569973 949939 task_exit.go:204] [ 48876: 48876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:45.570091 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:45.571067 949939 task_exit.go:204] [ 48876: 48876] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:45 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fallocate(r0, 0x40, 0x1, 0xffffffffffffffff) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:45.591456 949939 usertrap_amd64.go:212] [ 48885: 48885] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:45.591594 949939 usertrap_amd64.go:122] [ 48885: 48885] Allocate a new trap: 0xc000a70300 40 D0620 03:40:45.592127 949939 usertrap_amd64.go:225] [ 48885: 48885] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:45.594667 949939 usertrap_amd64.go:212] [ 48885: 48885] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:45.594751 949939 usertrap_amd64.go:122] [ 48885: 48885] Allocate a new trap: 0xc000a70300 41 D0620 03:40:45.594848 949939 usertrap_amd64.go:225] [ 48885: 48885] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:45.607999 949939 usertrap_amd64.go:212] [ 48885: 48885] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:45.608074 949939 usertrap_amd64.go:122] [ 48885: 48885] Allocate a new trap: 0xc000a70300 42 D0620 03:40:45.608168 949939 usertrap_amd64.go:225] [ 48885: 48885] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:46.010120 949939 usertrap_amd64.go:212] [ 48875: 48875] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:46.010234 949939 usertrap_amd64.go:122] [ 48875: 48875] Allocate a new trap: 0xc0030842d0 43 D0620 03:40:46.010304 949939 usertrap_amd64.go:225] [ 48875: 48875] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:46.014831 949939 task_exit.go:204] [ 48875: 48875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.015029 949939 task_exit.go:204] [ 48875: 48875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.014977 949939 task_signals.go:204] [ 48875: 48881] Signal 48875, PID: 48881, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.015191 949939 task_signals.go:204] [ 48875: 48888] Signal 48875, PID: 48888, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.015252 949939 task_exit.go:204] [ 48875: 48881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.015521 949939 task_exit.go:204] [ 48875: 48888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.015828 949939 task_exit.go:204] [ 48875: 48881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.015898 949939 task_exit.go:204] [ 48875: 48881] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.020743 949939 usertrap_amd64.go:212] [ 48877: 48883] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:40:46.020855 949939 usertrap_amd64.go:122] [ 48877: 48883] Allocate a new trap: 0xc0066f2390 43 D0620 03:40:46.020984 949939 usertrap_amd64.go:225] [ 48877: 48883] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:46.021041 949939 task_exit.go:204] [ 48875: 48888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.021204 949939 task_exit.go:204] [ 48875: 48888] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.021345 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:46.022614 949939 task_exit.go:204] [ 48875: 48875] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:46 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) removexattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=@random={'btrfs.', '----((%!{.*\x00'}) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:46.026313 949939 usertrap_amd64.go:212] [ 48877: 48877] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:46.026380 949939 usertrap_amd64.go:122] [ 48877: 48877] Allocate a new trap: 0xc0066f2390 44 D0620 03:40:46.026439 949939 usertrap_amd64.go:225] [ 48877: 48877] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:46.111865 949939 usertrap_amd64.go:212] [ 48885: 48885] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:46.111959 949939 usertrap_amd64.go:122] [ 48885: 48885] Allocate a new trap: 0xc000a70300 43 D0620 03:40:46.112019 949939 usertrap_amd64.go:225] [ 48885: 48885] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:46.372201 949939 usertrap_amd64.go:212] [ 48877: 48877] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:46.372338 949939 usertrap_amd64.go:122] [ 48877: 48877] Allocate a new trap: 0xc0066f2390 45 D0620 03:40:46.372442 949939 usertrap_amd64.go:225] [ 48877: 48877] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:40:46.374619 949939 task_exit.go:204] [ 48877: 48877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.374891 949939 task_exit.go:204] [ 48877: 48877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.375089 949939 task_signals.go:204] [ 48877: 48889] Signal 48877, PID: 48889, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.375221 949939 task_exit.go:204] [ 48877: 48889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.375330 949939 task_signals.go:204] [ 48877: 48883] Signal 48877, PID: 48883, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.375476 949939 task_exit.go:204] [ 48877: 48883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.375666 949939 task_exit.go:204] [ 48877: 48883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.375736 949939 task_exit.go:204] [ 48877: 48883] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.375869 949939 task_signals.go:204] [ 48877: 48879] Signal 48877, PID: 48879, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.375983 949939 task_exit.go:204] [ 48877: 48879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.376234 949939 task_exit.go:204] [ 48877: 48889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.376324 949939 task_exit.go:204] [ 48877: 48889] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.381321 949939 task_exit.go:204] [ 48877: 48879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.381479 949939 task_exit.go:204] [ 48877: 48879] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.381639 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:46.383540 949939 task_exit.go:204] [ 48877: 48877] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:46 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) (async) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x800) dup2(r0, r1) (async) r2 = dup2(r0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r3, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r3, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x13, r3, 0x741f7000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000100)={0x4}) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) fchdir(r2) (async) fchdir(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x0, 0x0) (async) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r5, 0x5450, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000), 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KIOCSOUND(r6, 0x4b2f, 0x6) D0620 03:40:46.405179 949939 usertrap_amd64.go:212] [ 48885: 48885] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:46.405285 949939 usertrap_amd64.go:122] [ 48885: 48885] Allocate a new trap: 0xc000a70300 44 D0620 03:40:46.405386 949939 usertrap_amd64.go:225] [ 48885: 48885] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:46.468483 949939 task_exit.go:204] [ 48885: 48885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.468719 949939 task_signals.go:204] [ 48885: 48887] Signal 48885, PID: 48887, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.468706 949939 task_signals.go:204] [ 48885: 48886] Signal 48885, PID: 48886, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.469135 949939 task_signals.go:204] [ 48885: 48890] Signal 48885, PID: 48890, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.469276 949939 task_exit.go:204] [ 48885: 48890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.469460 949939 task_exit.go:204] [ 48885: 48885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.469583 949939 task_exit.go:204] [ 48885: 48886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.469776 949939 task_exit.go:204] [ 48885: 48890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.469867 949939 task_exit.go:204] [ 48885: 48890] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.470043 949939 task_exit.go:204] [ 48885: 48886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.470106 949939 task_exit.go:204] [ 48885: 48886] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.470192 949939 task_exit.go:204] [ 48885: 48887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.477716 949939 usertrap_amd64.go:212] [ 48891: 48891] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:46.477806 949939 usertrap_amd64.go:122] [ 48891: 48891] Allocate a new trap: 0xc0066f2570 40 D0620 03:40:46.478726 949939 usertrap_amd64.go:225] [ 48891: 48891] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:46.479226 949939 task_exit.go:204] [ 48885: 48887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.479323 949939 task_exit.go:204] [ 48885: 48887] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.479412 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:46.479689 949939 task_exit.go:204] [ 48885: 48885] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:46 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fallocate(r0, 0x40, 0x1, 0xffffffffffffffff) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:46.482420 949939 usertrap_amd64.go:212] [ 48891: 48891] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:46.482502 949939 usertrap_amd64.go:122] [ 48891: 48891] Allocate a new trap: 0xc0066f2570 41 D0620 03:40:46.482581 949939 usertrap_amd64.go:225] [ 48891: 48891] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:46.486764 949939 usertrap_amd64.go:212] [ 48892: 48892] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:46.486888 949939 usertrap_amd64.go:122] [ 48892: 48892] Allocate a new trap: 0xc00945e3c0 40 D0620 03:40:46.488387 949939 usertrap_amd64.go:225] [ 48892: 48892] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:46.495704 949939 usertrap_amd64.go:212] [ 48892: 48892] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:46.495846 949939 usertrap_amd64.go:122] [ 48892: 48892] Allocate a new trap: 0xc00945e3c0 41 D0620 03:40:46.495958 949939 usertrap_amd64.go:225] [ 48892: 48892] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:46.505806 949939 usertrap_amd64.go:212] [ 48891: 48891] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:46.505906 949939 usertrap_amd64.go:122] [ 48891: 48891] Allocate a new trap: 0xc0066f2570 42 D0620 03:40:46.505979 949939 usertrap_amd64.go:225] [ 48891: 48891] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:46.518740 949939 usertrap_amd64.go:212] [ 48892: 48892] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:46.519018 949939 usertrap_amd64.go:122] [ 48892: 48892] Allocate a new trap: 0xc00945e3c0 42 D0620 03:40:46.519147 949939 usertrap_amd64.go:225] [ 48892: 48892] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:46.523319 949939 usertrap_amd64.go:212] [ 48891: 48891] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:46.523530 949939 usertrap_amd64.go:122] [ 48891: 48891] Allocate a new trap: 0xc0066f2570 43 D0620 03:40:46.523640 949939 usertrap_amd64.go:225] [ 48891: 48891] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:46.530156 949939 usertrap_amd64.go:212] [ 48893: 48893] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:46.530338 949939 usertrap_amd64.go:122] [ 48893: 48893] Allocate a new trap: 0xc003084360 40 D0620 03:40:46.531046 949939 usertrap_amd64.go:225] [ 48893: 48893] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:46.534513 949939 usertrap_amd64.go:212] [ 48893: 48893] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:46.534581 949939 usertrap_amd64.go:122] [ 48893: 48893] Allocate a new trap: 0xc003084360 41 D0620 03:40:46.534652 949939 usertrap_amd64.go:225] [ 48893: 48893] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:46.610871 949939 usertrap_amd64.go:212] [ 48892: 48898] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:40:46.610968 949939 usertrap_amd64.go:122] [ 48892: 48898] Allocate a new trap: 0xc00945e3c0 43 D0620 03:40:46.611066 949939 usertrap_amd64.go:225] [ 48892: 48898] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:46.614927 949939 usertrap_amd64.go:212] [ 48892: 48892] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:46.615012 949939 usertrap_amd64.go:122] [ 48892: 48892] Allocate a new trap: 0xc00945e3c0 44 D0620 03:40:46.615083 949939 usertrap_amd64.go:225] [ 48892: 48892] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:46.983701 949939 usertrap_amd64.go:212] [ 48891: 48891] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:46.984025 949939 usertrap_amd64.go:122] [ 48891: 48891] Allocate a new trap: 0xc0066f2570 44 D0620 03:40:46.984174 949939 usertrap_amd64.go:225] [ 48891: 48891] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:46.989057 949939 task_exit.go:204] [ 48891: 48891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.989235 949939 task_signals.go:204] [ 48891: 48897] Signal 48891, PID: 48897, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.989265 949939 task_signals.go:204] [ 48891: 48894] Signal 48891, PID: 48894, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.989405 949939 task_exit.go:204] [ 48891: 48897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.989513 949939 task_signals.go:204] [ 48891: 48895] Signal 48891, PID: 48895, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:46.989609 949939 task_exit.go:204] [ 48891: 48895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.989693 949939 task_exit.go:204] [ 48891: 48897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.989856 949939 task_exit.go:204] [ 48891: 48897] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.990104 949939 task_exit.go:204] [ 48891: 48894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:46.990674 949939 task_exit.go:204] [ 48891: 48894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.990814 949939 task_exit.go:204] [ 48891: 48894] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.991034 949939 task_exit.go:204] [ 48891: 48891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.996122 949939 task_exit.go:204] [ 48891: 48895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:46.996231 949939 task_exit.go:204] [ 48891: 48895] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:46.996285 949939 usertrap_amd64.go:212] [ 48893: 48893] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:46.996329 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:46.996381 949939 usertrap_amd64.go:122] [ 48893: 48893] Allocate a new trap: 0xc003084360 42 D0620 03:40:46.996464 949939 usertrap_amd64.go:225] [ 48893: 48893] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:46.996977 949939 task_exit.go:204] [ 48891: 48891] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.113633 949939 usertrap_amd64.go:212] [ 48893: 48893] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:47.113756 949939 usertrap_amd64.go:122] [ 48893: 48893] Allocate a new trap: 0xc003084360 43 D0620 03:40:47.113853 949939 usertrap_amd64.go:225] [ 48893: 48893] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:47.343891 949939 usertrap_amd64.go:212] [ 48892: 48892] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:47.344017 949939 usertrap_amd64.go:122] [ 48892: 48892] Allocate a new trap: 0xc00945e3c0 45 D0620 03:40:47.344083 949939 usertrap_amd64.go:225] [ 48892: 48892] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:40:47.347568 949939 task_exit.go:204] [ 48892: 48892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.347763 949939 task_signals.go:204] [ 48892: 48899] Signal 48892, PID: 48899, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:47.347847 949939 task_exit.go:204] [ 48892: 48892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.347975 949939 task_exit.go:204] [ 48892: 48899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.348198 949939 task_signals.go:204] [ 48892: 48896] Signal 48892, PID: 48896, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:47.348170 949939 task_signals.go:204] [ 48892: 48898] Signal 48892, PID: 48898, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:47.348359 949939 task_exit.go:204] [ 48892: 48899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.348447 949939 task_exit.go:204] [ 48892: 48899] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.348611 949939 task_exit.go:204] [ 48892: 48896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.348798 949939 task_exit.go:204] [ 48892: 48896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.348857 949939 task_exit.go:204] [ 48892: 48896] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.349040 949939 task_exit.go:204] [ 48892: 48898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.354016 949939 task_exit.go:204] [ 48892: 48898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.354071 949939 task_exit.go:204] [ 48892: 48898] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.354159 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:47.354507 949939 task_exit.go:204] [ 48892: 48892] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.365953 949939 task_signals.go:470] [ 7: 26] Notified of signal 23 D0620 03:40:47.366363 949939 task_signals.go:220] [ 7: 26] Signal 23: delivering to handler D0620 03:40:47.492658 949939 usertrap_amd64.go:212] [ 48893: 48893] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:47.492764 949939 usertrap_amd64.go:122] [ 48893: 48893] Allocate a new trap: 0xc003084360 44 D0620 03:40:47.492845 949939 usertrap_amd64.go:225] [ 48893: 48893] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:47.501158 949939 task_exit.go:204] [ 48893: 48893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.501356 949939 task_signals.go:204] [ 48893: 48902] Signal 48893, PID: 48902, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:47.501589 949939 task_exit.go:204] [ 48893: 48893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.501734 949939 task_signals.go:204] [ 48893: 48900] Signal 48893, PID: 48900, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:47.501778 949939 task_exit.go:204] [ 48893: 48902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.501890 949939 task_exit.go:204] [ 48893: 48900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.502123 949939 task_signals.go:204] [ 48893: 48901] Signal 48893, PID: 48901, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:47.502146 949939 task_exit.go:204] [ 48893: 48900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.502200 949939 task_exit.go:204] [ 48893: 48900] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.502370 949939 task_exit.go:204] [ 48893: 48902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.502438 949939 task_exit.go:204] [ 48893: 48902] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.502572 949939 task_exit.go:204] [ 48893: 48901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:47.507355 949939 task_exit.go:204] [ 48893: 48901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:47.507462 949939 task_exit.go:204] [ 48893: 48901] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:47.507570 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:47.507719 949939 task_exit.go:204] [ 48893: 48893] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:48.516479 949939 task_stop.go:138] [ 48878: 48878] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:48.516636 949939 task_stop.go:138] [ 48878: 48884] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:48.516745 949939 task_signals.go:481] [ 48878: 48878] No task notified of signal 9 D0620 03:40:48.516928 949939 task_signals.go:458] [ 48878: 48878] Discarding duplicate signal 9 D0620 03:40:48.516912 949939 task_signals.go:204] [ 48878: 48884] Signal 48878, PID: 48884, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:48.517148 949939 task_exit.go:204] [ 48878: 48884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:48.517387 949939 task_signals.go:204] [ 48878: 48878] Signal 48878, PID: 48878, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:48.517442 949939 task_exit.go:204] [ 48878: 48884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:48.517493 949939 task_exit.go:204] [ 48878: 48884] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:48.517779 949939 task_exit.go:204] [ 48878: 48878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:48.522297 949939 task_exit.go:204] [ 48878: 48878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:48.522374 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:48.522647 949939 task_exit.go:204] [ 48878: 48878] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:48 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = gettid() tkill(r1, 0x401004000000016) prlimit64(r1, 0xc, &(0x7f0000000200)={0x4}, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) (async) lsetxattr$smack_xattr_label(&(0x7f0000000000)='./bus\x00', &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)={'#&&'}, 0x4, 0x3) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 03:40:48 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fallocate(r0, 0x40, 0x1, 0xffffffffffffffff) (async, rerun: 64) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async, rerun: 64) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) 03:40:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) r3 = dup2(r1, r2) signalfd(r3, &(0x7f0000000000), 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r4, 0x5450, 0x0) listen(r4, 0x9) socketpair(0x2, 0x1, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r7, 0x5450, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r8, 0x5450, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r9, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x40) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r10, 0x5450, 0x0) r11 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r11, 0x5450) r12 = openat(r11, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TCSETAW(r12, 0x5450, 0x0) dup(r5) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/net', 0x480, 0x1bd) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0xe2) 03:40:48 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) removexattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=@random={'btrfs.', '----((%!{.*\x00'}) (async) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:48.541728 949939 usertrap_amd64.go:212] [ 48903: 48903] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:48.541851 949939 usertrap_amd64.go:122] [ 48903: 48903] Allocate a new trap: 0xc002b2ea80 40 D0620 03:40:48.542589 949939 usertrap_amd64.go:225] [ 48903: 48903] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:48.546199 949939 usertrap_amd64.go:212] [ 48903: 48903] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:48.546295 949939 usertrap_amd64.go:122] [ 48903: 48903] Allocate a new trap: 0xc002b2ea80 41 D0620 03:40:48.546335 949939 usertrap_amd64.go:212] [ 48905: 48905] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:48.546420 949939 usertrap_amd64.go:225] [ 48903: 48903] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:48.546447 949939 usertrap_amd64.go:122] [ 48905: 48905] Allocate a new trap: 0xc0093ae900 40 D0620 03:40:48.547237 949939 usertrap_amd64.go:225] [ 48905: 48905] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:48.549008 949939 usertrap_amd64.go:212] [ 48904: 48904] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:48.549121 949939 usertrap_amd64.go:122] [ 48904: 48904] Allocate a new trap: 0xc0093ae8d0 40 D0620 03:40:48.549472 949939 usertrap_amd64.go:212] [ 48906: 48906] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:48.549630 949939 usertrap_amd64.go:122] [ 48906: 48906] Allocate a new trap: 0xc002b2eab0 40 D0620 03:40:48.550203 949939 usertrap_amd64.go:225] [ 48906: 48906] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:48.550542 949939 usertrap_amd64.go:225] [ 48904: 48904] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:48.550665 949939 usertrap_amd64.go:212] [ 48905: 48905] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:48.550733 949939 usertrap_amd64.go:122] [ 48905: 48905] Allocate a new trap: 0xc0093ae900 41 D0620 03:40:48.550825 949939 usertrap_amd64.go:225] [ 48905: 48905] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:48.554268 949939 usertrap_amd64.go:212] [ 48904: 48904] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:48.554405 949939 usertrap_amd64.go:122] [ 48904: 48904] Allocate a new trap: 0xc0093ae8d0 41 D0620 03:40:48.554496 949939 usertrap_amd64.go:225] [ 48904: 48904] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:48.557307 949939 usertrap_amd64.go:212] [ 48906: 48906] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:48.557526 949939 usertrap_amd64.go:122] [ 48906: 48906] Allocate a new trap: 0xc002b2eab0 41 D0620 03:40:48.557727 949939 usertrap_amd64.go:225] [ 48906: 48906] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:48.566565 949939 usertrap_amd64.go:212] [ 48903: 48903] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:48.566640 949939 usertrap_amd64.go:122] [ 48903: 48903] Allocate a new trap: 0xc002b2ea80 42 D0620 03:40:48.566742 949939 usertrap_amd64.go:225] [ 48903: 48903] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:48.568226 949939 usertrap_amd64.go:212] [ 48905: 48905] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:48.568295 949939 usertrap_amd64.go:122] [ 48905: 48905] Allocate a new trap: 0xc0093ae900 42 D0620 03:40:48.568356 949939 usertrap_amd64.go:225] [ 48905: 48905] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:48.573087 949939 usertrap_amd64.go:212] [ 48904: 48904] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:48.573192 949939 usertrap_amd64.go:122] [ 48904: 48904] Allocate a new trap: 0xc0093ae8d0 42 D0620 03:40:48.573279 949939 usertrap_amd64.go:225] [ 48904: 48904] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:48.588294 949939 usertrap_amd64.go:212] [ 48906: 48906] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:48.588430 949939 usertrap_amd64.go:122] [ 48906: 48906] Allocate a new trap: 0xc002b2eab0 42 D0620 03:40:48.588528 949939 usertrap_amd64.go:225] [ 48906: 48906] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:48.594182 949939 task_signals.go:470] [ 48906: 48911] Notified of signal 22 D0620 03:40:48.594392 949939 task_signals.go:808] [ 48906: 48911] Signal 22: stopping 3 threads in thread group D0620 03:40:48.594488 949939 task_stop.go:118] [ 48906: 48906] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:48.594590 949939 task_stop.go:118] [ 48906: 48911] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:48.594658 949939 task_signals.go:885] [ 48906: 48912] Completing group stop D0620 03:40:48.594716 949939 task_stop.go:118] [ 48906: 48912] Entering internal stop (*kernel.groupStop)(nil) D0620 03:40:48.594767 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:48.637182 949939 usertrap_amd64.go:212] [ 48903: 48903] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:48.637290 949939 usertrap_amd64.go:122] [ 48903: 48903] Allocate a new trap: 0xc002b2ea80 43 D0620 03:40:48.637396 949939 usertrap_amd64.go:225] [ 48903: 48903] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:48.638265 949939 usertrap_amd64.go:212] [ 48905: 48905] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:48.638419 949939 usertrap_amd64.go:122] [ 48905: 48905] Allocate a new trap: 0xc0093ae900 43 D0620 03:40:48.639531 949939 usertrap_amd64.go:225] [ 48905: 48905] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:48.810578 949939 usertrap_amd64.go:212] [ 48904: 48904] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:48.810714 949939 usertrap_amd64.go:122] [ 48904: 48904] Allocate a new trap: 0xc0093ae8d0 43 D0620 03:40:48.810806 949939 usertrap_amd64.go:225] [ 48904: 48904] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:49.391793 949939 usertrap_amd64.go:212] [ 48903: 48903] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:49.391935 949939 usertrap_amd64.go:122] [ 48903: 48903] Allocate a new trap: 0xc002b2ea80 44 D0620 03:40:49.392158 949939 usertrap_amd64.go:225] [ 48903: 48903] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:49.395195 949939 usertrap_amd64.go:212] [ 48905: 48905] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:49.395319 949939 usertrap_amd64.go:122] [ 48905: 48905] Allocate a new trap: 0xc0093ae900 44 D0620 03:40:49.395571 949939 usertrap_amd64.go:225] [ 48905: 48905] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:49.396916 949939 usertrap_amd64.go:212] [ 48904: 48904] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:49.397033 949939 usertrap_amd64.go:122] [ 48904: 48904] Allocate a new trap: 0xc0093ae8d0 44 D0620 03:40:49.397113 949939 usertrap_amd64.go:225] [ 48904: 48904] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:49.397948 949939 task_exit.go:204] [ 48903: 48903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.398316 949939 task_signals.go:204] [ 48903: 48913] Signal 48903, PID: 48913, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.398426 949939 task_exit.go:204] [ 48903: 48913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.398762 949939 task_exit.go:204] [ 48903: 48913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.398833 949939 task_exit.go:204] [ 48903: 48913] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.399060 949939 task_signals.go:204] [ 48903: 48915] Signal 48903, PID: 48915, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.399275 949939 task_exit.go:204] [ 48903: 48915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.399607 949939 task_exit.go:204] [ 48903: 48915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.399676 949939 task_exit.go:204] [ 48903: 48915] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.404834 949939 task_signals.go:204] [ 48905: 48917] Signal 48905, PID: 48917, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.404873 949939 task_signals.go:204] [ 48905: 48916] Signal 48905, PID: 48916, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.405007 949939 task_exit.go:204] [ 48905: 48905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.405360 949939 task_exit.go:204] [ 48905: 48917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.405573 949939 task_signals.go:204] [ 48905: 48907] Signal 48905, PID: 48907, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.405658 949939 task_signals.go:204] [ 48905: 48910] Signal 48905, PID: 48910, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.405804 949939 task_exit.go:204] [ 48905: 48910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.405923 949939 task_signals.go:204] [ 48903: 48914] Signal 48903, PID: 48914, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.405964 949939 task_signals.go:204] [ 48903: 48908] Signal 48903, PID: 48908, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.406166 949939 task_exit.go:204] [ 48903: 48908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.406452 949939 task_exit.go:204] [ 48905: 48910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.406655 949939 task_exit.go:204] [ 48905: 48910] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.406899 949939 task_exit.go:204] [ 48905: 48917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.407025 949939 task_exit.go:204] [ 48905: 48917] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.407226 949939 task_exit.go:204] [ 48905: 48907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.407399 949939 task_exit.go:204] [ 48905: 48916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.407535 949939 task_exit.go:204] [ 48903: 48914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.408153 949939 task_exit.go:204] [ 48905: 48907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.408243 949939 task_exit.go:204] [ 48905: 48907] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.408455 949939 task_exit.go:204] [ 48903: 48908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.408617 949939 task_exit.go:204] [ 48903: 48908] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.409428 949939 task_exit.go:204] [ 48903: 48903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.409823 949939 task_exit.go:204] [ 48905: 48905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.410286 949939 task_exit.go:204] [ 48904: 48904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.410517 949939 task_exit.go:204] [ 48904: 48904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.410883 949939 task_signals.go:204] [ 48904: 48920] Signal 48904, PID: 48920, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.412813 949939 task_exit.go:204] [ 48904: 48920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.410945 949939 task_signals.go:204] [ 48904: 48909] Signal 48904, PID: 48909, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.411098 949939 task_signals.go:204] [ 48904: 48918] Signal 48904, PID: 48918, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.411161 949939 task_signals.go:204] [ 48904: 48921] Signal 48904, PID: 48921, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.411124 949939 task_signals.go:204] [ 48904: 48919] Signal 48904, PID: 48919, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.413034 949939 task_exit.go:204] [ 48904: 48909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.413149 949939 task_exit.go:204] [ 48904: 48918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.413437 949939 task_exit.go:204] [ 48904: 48921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.413668 949939 task_exit.go:204] [ 48904: 48919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.414144 949939 task_exit.go:204] [ 48904: 48918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.414213 949939 task_exit.go:204] [ 48904: 48918] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.414382 949939 task_exit.go:204] [ 48904: 48921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.414429 949939 task_exit.go:204] [ 48904: 48921] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.414555 949939 task_exit.go:204] [ 48904: 48920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.414604 949939 task_exit.go:204] [ 48904: 48920] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.414743 949939 task_exit.go:204] [ 48904: 48909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.414858 949939 task_exit.go:204] [ 48904: 48909] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.415852 949939 task_exit.go:204] [ 48905: 48916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.415920 949939 task_exit.go:204] [ 48905: 48916] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.415994 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:49.416842 949939 task_exit.go:204] [ 48905: 48905] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.418029 949939 task_exit.go:204] [ 48903: 48914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.418149 949939 task_exit.go:204] [ 48903: 48914] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') bind$unix(r1, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) D0620 03:40:49.418249 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:49.418367 949939 task_exit.go:204] [ 48903: 48903] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:49 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x28, 0x1, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:40:49.422042 949939 task_exit.go:204] [ 48904: 48919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.422539 949939 task_exit.go:204] [ 48904: 48919] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.422883 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:49.427704 949939 task_exit.go:204] [ 48904: 48904] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) r3 = dup2(r1, r2) signalfd(r3, &(0x7f0000000000), 0x8) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r4, 0x5450, 0x0) (async) listen(r4, 0x9) (async) socketpair(0x2, 0x1, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r7, 0x5450, 0x0) (async) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r8, 0x5450, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r9, 0x5450, 0x0) (async) creat(&(0x7f0000000080)='./file0\x00', 0x40) (async) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r10, 0x5450, 0x0) (async) r11 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r11, 0x5450) (async) r12 = openat(r11, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TCSETAW(r12, 0x5450, 0x0) (async) dup(r5) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/net', 0x480, 0x1bd) (async) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0xe2) D0620 03:40:49.507147 949939 usertrap_amd64.go:212] [ 48922: 48922] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:49.507298 949939 usertrap_amd64.go:122] [ 48922: 48922] Allocate a new trap: 0xc002b2ed20 40 D0620 03:40:49.507998 949939 usertrap_amd64.go:225] [ 48922: 48922] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:49.510361 949939 usertrap_amd64.go:212] [ 48923: 48923] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:49.510463 949939 usertrap_amd64.go:122] [ 48923: 48923] Allocate a new trap: 0xc002b2ed50 40 D0620 03:40:49.511054 949939 usertrap_amd64.go:225] [ 48923: 48923] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:49.512820 949939 usertrap_amd64.go:212] [ 48922: 48922] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:49.512890 949939 usertrap_amd64.go:122] [ 48922: 48922] Allocate a new trap: 0xc002b2ed20 41 D0620 03:40:49.513047 949939 usertrap_amd64.go:225] [ 48922: 48922] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:49.514008 949939 usertrap_amd64.go:212] [ 48924: 48924] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:49.514092 949939 usertrap_amd64.go:122] [ 48924: 48924] Allocate a new trap: 0xc002b2ed80 40 D0620 03:40:49.514586 949939 usertrap_amd64.go:225] [ 48924: 48924] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:49.514815 949939 usertrap_amd64.go:212] [ 48923: 48923] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:49.514941 949939 usertrap_amd64.go:122] [ 48923: 48923] Allocate a new trap: 0xc002b2ed50 41 D0620 03:40:49.515047 949939 usertrap_amd64.go:225] [ 48923: 48923] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:49.517859 949939 usertrap_amd64.go:212] [ 48924: 48924] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:49.517944 949939 usertrap_amd64.go:122] [ 48924: 48924] Allocate a new trap: 0xc002b2ed80 41 D0620 03:40:49.518070 949939 usertrap_amd64.go:225] [ 48924: 48924] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:49.721555 949939 usertrap_amd64.go:212] [ 48922: 48922] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:49.721720 949939 usertrap_amd64.go:122] [ 48922: 48922] Allocate a new trap: 0xc002b2ed20 42 D0620 03:40:49.721806 949939 usertrap_amd64.go:225] [ 48922: 48922] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:49.730439 949939 usertrap_amd64.go:212] [ 48924: 48924] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:49.730568 949939 usertrap_amd64.go:122] [ 48924: 48924] Allocate a new trap: 0xc002b2ed80 42 D0620 03:40:49.730633 949939 usertrap_amd64.go:225] [ 48924: 48924] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:49.730739 949939 usertrap_amd64.go:212] [ 48923: 48923] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:49.730869 949939 usertrap_amd64.go:122] [ 48923: 48923] Allocate a new trap: 0xc002b2ed50 42 D0620 03:40:49.730963 949939 usertrap_amd64.go:225] [ 48923: 48923] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:49.750304 949939 usertrap_amd64.go:212] [ 48923: 48923] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:49.750431 949939 usertrap_amd64.go:122] [ 48923: 48923] Allocate a new trap: 0xc002b2ed50 43 D0620 03:40:49.750505 949939 usertrap_amd64.go:225] [ 48923: 48923] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:49.756720 949939 task_exit.go:204] [ 48923: 48923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.758415 949939 task_signals.go:204] [ 48923: 48927] Signal 48923, PID: 48927, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:49.758499 949939 task_exit.go:204] [ 48923: 48923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.758733 949939 task_exit.go:204] [ 48923: 48927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:49.763986 949939 task_exit.go:204] [ 48923: 48927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:49.764229 949939 task_exit.go:204] [ 48923: 48927] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:49.764427 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:49.765802 949939 task_exit.go:204] [ 48923: 48923] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:49 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x28, 0x1, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x28, 0x1, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) D0620 03:40:49.796326 949939 usertrap_amd64.go:212] [ 48929: 48929] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:49.796436 949939 usertrap_amd64.go:122] [ 48929: 48929] Allocate a new trap: 0xc0021b4bd0 40 D0620 03:40:49.797218 949939 usertrap_amd64.go:225] [ 48929: 48929] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:49.801693 949939 usertrap_amd64.go:212] [ 48929: 48929] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:49.801879 949939 usertrap_amd64.go:122] [ 48929: 48929] Allocate a new trap: 0xc0021b4bd0 41 D0620 03:40:49.801963 949939 usertrap_amd64.go:225] [ 48929: 48929] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:49.810219 949939 task_signals.go:470] [ 7: 4632] Notified of signal 23 D0620 03:40:49.810803 949939 task_signals.go:179] [ 7: 4632] Restarting syscall 202: interrupted by signal 23 D0620 03:40:49.810996 949939 task_signals.go:220] [ 7: 4632] Signal 23: delivering to handler D0620 03:40:49.897230 949939 usertrap_amd64.go:212] [ 48922: 48922] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:49.897383 949939 usertrap_amd64.go:122] [ 48922: 48922] Allocate a new trap: 0xc002b2ed20 43 D0620 03:40:49.897517 949939 usertrap_amd64.go:225] [ 48922: 48922] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:50.170339 949939 usertrap_amd64.go:212] [ 48924: 48924] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:50.170448 949939 usertrap_amd64.go:122] [ 48924: 48924] Allocate a new trap: 0xc002b2ed80 43 D0620 03:40:50.170667 949939 usertrap_amd64.go:225] [ 48924: 48924] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:50.226574 949939 usertrap_amd64.go:212] [ 48922: 48922] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:50.226680 949939 usertrap_amd64.go:122] [ 48922: 48922] Allocate a new trap: 0xc002b2ed20 44 D0620 03:40:50.226760 949939 usertrap_amd64.go:225] [ 48922: 48922] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:50.232619 949939 task_exit.go:204] [ 48922: 48922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.232871 949939 task_exit.go:204] [ 48922: 48922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.232893 949939 task_signals.go:204] [ 48922: 48930] Signal 48922, PID: 48930, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.233046 949939 task_exit.go:204] [ 48922: 48930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.233125 949939 task_signals.go:204] [ 48922: 48932] Signal 48922, PID: 48932, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.233205 949939 task_exit.go:204] [ 48922: 48932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.233203 949939 task_signals.go:204] [ 48922: 48935] Signal 48922, PID: 48935, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.233365 949939 task_exit.go:204] [ 48922: 48935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.233655 949939 task_signals.go:204] [ 48922: 48925] Signal 48922, PID: 48925, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.233746 949939 task_exit.go:204] [ 48922: 48930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.233795 949939 task_exit.go:204] [ 48922: 48930] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.233979 949939 task_exit.go:204] [ 48922: 48925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.234216 949939 task_exit.go:204] [ 48922: 48932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.234474 949939 task_exit.go:204] [ 48922: 48932] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.234722 949939 task_exit.go:204] [ 48922: 48935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.234782 949939 task_exit.go:204] [ 48922: 48935] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.239453 949939 task_exit.go:204] [ 48922: 48925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.239587 949939 task_exit.go:204] [ 48922: 48925] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.239732 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:50.239956 949939 usertrap_amd64.go:212] [ 48929: 48929] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:50.240039 949939 usertrap_amd64.go:122] [ 48929: 48929] Allocate a new trap: 0xc0021b4bd0 42 D0620 03:40:50.240129 949939 usertrap_amd64.go:225] [ 48929: 48929] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:50.241019 949939 task_exit.go:204] [ 48922: 48922] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.248644 949939 usertrap_amd64.go:212] [ 48929: 48929] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:50.248725 949939 usertrap_amd64.go:122] [ 48929: 48929] Allocate a new trap: 0xc0021b4bd0 43 D0620 03:40:50.248789 949939 usertrap_amd64.go:225] [ 48929: 48929] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:50.308848 949939 usertrap_amd64.go:212] [ 48929: 48929] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:50.309026 949939 usertrap_amd64.go:122] [ 48929: 48929] Allocate a new trap: 0xc0021b4bd0 44 D0620 03:40:50.309133 949939 usertrap_amd64.go:225] [ 48929: 48929] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:50.312646 949939 task_exit.go:204] [ 48929: 48929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.312932 949939 task_signals.go:204] [ 48929: 48943] Signal 48929, PID: 48943, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.313058 949939 task_signals.go:204] [ 48929: 48941] Signal 48929, PID: 48941, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.312997 949939 task_signals.go:204] [ 48929: 48942] Signal 48929, PID: 48942, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.313121 949939 task_exit.go:204] [ 48929: 48943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.313260 949939 task_exit.go:204] [ 48929: 48942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.313476 949939 task_exit.go:204] [ 48929: 48942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.313574 949939 task_exit.go:204] [ 48929: 48942] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.313865 949939 task_exit.go:204] [ 48929: 48941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.314398 949939 task_exit.go:204] [ 48929: 48929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.314591 949939 task_exit.go:204] [ 48929: 48941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.314659 949939 task_exit.go:204] [ 48929: 48941] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.318510 949939 task_exit.go:204] [ 48929: 48943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.318609 949939 task_exit.go:204] [ 48929: 48943] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.318737 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:50.320007 949939 task_exit.go:204] [ 48929: 48929] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.553126 949939 usertrap_amd64.go:212] [ 48924: 48924] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:50.553216 949939 usertrap_amd64.go:122] [ 48924: 48924] Allocate a new trap: 0xc002b2ed80 44 D0620 03:40:50.553285 949939 usertrap_amd64.go:225] [ 48924: 48924] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:50.558140 949939 task_exit.go:204] [ 48924: 48924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.558301 949939 task_signals.go:204] [ 48924: 48934] Signal 48924, PID: 48934, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558667 949939 task_signals.go:204] [ 48924: 48939] Signal 48924, PID: 48939, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558757 949939 task_signals.go:204] [ 48924: 48926] Signal 48924, PID: 48926, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558765 949939 task_signals.go:204] [ 48924: 48931] Signal 48924, PID: 48931, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558819 949939 task_signals.go:204] [ 48924: 48937] Signal 48924, PID: 48937, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558909 949939 task_signals.go:204] [ 48924: 48940] Signal 48924, PID: 48940, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558949 949939 task_signals.go:204] [ 48924: 48933] Signal 48924, PID: 48933, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.558999 949939 task_signals.go:204] [ 48924: 48938] Signal 48924, PID: 48938, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.559045 949939 task_signals.go:204] [ 48924: 48936] Signal 48924, PID: 48936, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.559177 949939 task_signals.go:204] [ 48924: 48928] Signal 48924, PID: 48928, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:50.559192 949939 task_exit.go:204] [ 48924: 48924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.559276 949939 task_exit.go:204] [ 48924: 48928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.559471 949939 task_exit.go:204] [ 48924: 48928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.559513 949939 task_exit.go:204] [ 48924: 48928] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.559624 949939 task_exit.go:204] [ 48924: 48934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.559782 949939 task_exit.go:204] [ 48924: 48934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.559818 949939 task_exit.go:204] [ 48924: 48934] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.559901 949939 task_exit.go:204] [ 48924: 48939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.560042 949939 task_exit.go:204] [ 48924: 48939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.560083 949939 task_exit.go:204] [ 48924: 48939] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.560259 949939 task_exit.go:204] [ 48924: 48926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.560419 949939 task_exit.go:204] [ 48924: 48926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.560491 949939 task_exit.go:204] [ 48924: 48926] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.560590 949939 task_exit.go:204] [ 48924: 48931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.560705 949939 task_exit.go:204] [ 48924: 48931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.560744 949939 task_exit.go:204] [ 48924: 48931] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.560813 949939 task_exit.go:204] [ 48924: 48937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.560934 949939 task_exit.go:204] [ 48924: 48937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.561026 949939 task_exit.go:204] [ 48924: 48937] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.561097 949939 task_exit.go:204] [ 48924: 48940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.561168 949939 task_exit.go:204] [ 48924: 48933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.561296 949939 task_exit.go:204] [ 48924: 48938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.561405 949939 task_exit.go:204] [ 48924: 48936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:50.561733 949939 task_exit.go:204] [ 48924: 48933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.561820 949939 task_exit.go:204] [ 48924: 48933] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.562021 949939 task_exit.go:204] [ 48924: 48938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.562092 949939 task_exit.go:204] [ 48924: 48938] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.562195 949939 task_exit.go:204] [ 48924: 48940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.562244 949939 task_exit.go:204] [ 48924: 48940] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.567693 949939 task_exit.go:204] [ 48924: 48936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:50.567753 949939 task_exit.go:204] [ 48924: 48936] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:50.567821 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:50.568176 949939 task_exit.go:204] [ 48924: 48924] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:51.540478 949939 task_stop.go:138] [ 48906: 48906] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:51.540639 949939 task_stop.go:138] [ 48906: 48911] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:51.540755 949939 task_stop.go:138] [ 48906: 48912] Leaving internal stop (*kernel.groupStop)(nil) D0620 03:40:51.540811 949939 task_signals.go:481] [ 48906: 48906] No task notified of signal 9 D0620 03:40:51.541132 949939 task_signals.go:458] [ 48906: 48906] Discarding duplicate signal 9 D0620 03:40:51.541181 949939 task_signals.go:204] [ 48906: 48906] Signal 48906, PID: 48906, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:51.541415 949939 task_exit.go:204] [ 48906: 48906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.541723 949939 task_signals.go:204] [ 48906: 48911] Signal 48906, PID: 48911, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:51.541707 949939 task_signals.go:204] [ 48906: 48912] Signal 48906, PID: 48912, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:51.541917 949939 task_exit.go:204] [ 48906: 48911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.542091 949939 task_exit.go:204] [ 48906: 48911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.542145 949939 task_exit.go:204] [ 48906: 48911] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:51.542330 949939 task_exit.go:204] [ 48906: 48906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.542437 949939 task_exit.go:204] [ 48906: 48912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.547312 949939 task_exit.go:204] [ 48906: 48912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.547393 949939 task_exit.go:204] [ 48906: 48912] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:51.547470 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:51.548433 949939 task_exit.go:204] [ 48906: 48906] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:51 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@mcast2, @multicast2, 0xf, 0x9}}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 03:40:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)) (async) r1 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r1, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') bind$unix(r1, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 03:40:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x6) (async, rerun: 32) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (rerun: 32) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) r3 = dup2(r1, r2) signalfd(r3, &(0x7f0000000000), 0x8) (async, rerun: 64) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (rerun: 64) ioctl$TCSETAW(r4, 0x5450, 0x0) (async) listen(r4, 0x9) socketpair(0x2, 0x1, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r7, 0x5450, 0x0) (async, rerun: 64) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (rerun: 64) ioctl$TCSETAW(r8, 0x5450, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r9, 0x5450, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x40) (async) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r10, 0x5450, 0x0) (async) r11 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r11, 0x5450) (async) r12 = openat(r11, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TCSETAW(r12, 0x5450, 0x0) (async, rerun: 32) dup(r5) (rerun: 32) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/net', 0x480, 0x1bd) (async) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, 0x0, 0xe2) 03:40:51 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x28, 0x1, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x28, 0x1, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) D0620 03:40:51.572043 949939 usertrap_amd64.go:212] [ 48944: 48944] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:51.572181 949939 usertrap_amd64.go:122] [ 48944: 48944] Allocate a new trap: 0xc009a010b0 40 D0620 03:40:51.573442 949939 usertrap_amd64.go:225] [ 48944: 48944] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:51.577417 949939 usertrap_amd64.go:212] [ 48944: 48944] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:51.577528 949939 usertrap_amd64.go:122] [ 48944: 48944] Allocate a new trap: 0xc009a010b0 41 D0620 03:40:51.577621 949939 usertrap_amd64.go:225] [ 48944: 48944] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:51.579235 949939 usertrap_amd64.go:212] [ 48945: 48945] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:51.579351 949939 usertrap_amd64.go:122] [ 48945: 48945] Allocate a new trap: 0xc009c86a80 40 D0620 03:40:51.580134 949939 usertrap_amd64.go:225] [ 48945: 48945] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:51.583314 949939 usertrap_amd64.go:212] [ 48946: 48946] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:51.583488 949939 usertrap_amd64.go:122] [ 48946: 48946] Allocate a new trap: 0xc0066f2c00 40 D0620 03:40:51.584165 949939 usertrap_amd64.go:225] [ 48946: 48946] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:51.584398 949939 usertrap_amd64.go:212] [ 48947: 48947] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:51.584501 949939 usertrap_amd64.go:122] [ 48947: 48947] Allocate a new trap: 0xc000a707b0 40 D0620 03:40:51.585261 949939 usertrap_amd64.go:225] [ 48947: 48947] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:51.587477 949939 usertrap_amd64.go:212] [ 48945: 48945] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:51.587789 949939 usertrap_amd64.go:122] [ 48945: 48945] Allocate a new trap: 0xc009c86a80 41 D0620 03:40:51.587907 949939 usertrap_amd64.go:212] [ 48946: 48946] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:51.588015 949939 usertrap_amd64.go:122] [ 48946: 48946] Allocate a new trap: 0xc0066f2c00 41 D0620 03:40:51.587945 949939 usertrap_amd64.go:225] [ 48945: 48945] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:51.588120 949939 usertrap_amd64.go:225] [ 48946: 48946] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:51.589643 949939 usertrap_amd64.go:212] [ 48947: 48947] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:51.589755 949939 usertrap_amd64.go:122] [ 48947: 48947] Allocate a new trap: 0xc000a707b0 41 D0620 03:40:51.589839 949939 usertrap_amd64.go:225] [ 48947: 48947] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:51.606480 949939 usertrap_amd64.go:212] [ 48944: 48944] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:51.606643 949939 usertrap_amd64.go:122] [ 48944: 48944] Allocate a new trap: 0xc009a010b0 42 D0620 03:40:51.606819 949939 usertrap_amd64.go:225] [ 48944: 48944] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:51.617304 949939 usertrap_amd64.go:212] [ 48946: 48946] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:51.617409 949939 usertrap_amd64.go:122] [ 48946: 48946] Allocate a new trap: 0xc0066f2c00 42 D0620 03:40:51.617532 949939 usertrap_amd64.go:225] [ 48946: 48946] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:51.624071 949939 usertrap_amd64.go:212] [ 48945: 48945] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:51.624257 949939 usertrap_amd64.go:122] [ 48945: 48945] Allocate a new trap: 0xc009c86a80 42 D0620 03:40:51.624402 949939 usertrap_amd64.go:225] [ 48945: 48945] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:51.637137 949939 usertrap_amd64.go:212] [ 48946: 48946] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:51.637228 949939 usertrap_amd64.go:122] [ 48946: 48946] Allocate a new trap: 0xc0066f2c00 43 D0620 03:40:51.637374 949939 usertrap_amd64.go:225] [ 48946: 48946] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:51.639401 949939 usertrap_amd64.go:212] [ 48946: 48946] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:51.639545 949939 usertrap_amd64.go:122] [ 48946: 48946] Allocate a new trap: 0xc0066f2c00 44 D0620 03:40:51.639711 949939 usertrap_amd64.go:225] [ 48946: 48946] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:51.642781 949939 usertrap_amd64.go:212] [ 48947: 48947] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:51.642884 949939 usertrap_amd64.go:122] [ 48947: 48947] Allocate a new trap: 0xc000a707b0 42 D0620 03:40:51.642975 949939 usertrap_amd64.go:225] [ 48947: 48947] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:51.648914 949939 task_exit.go:204] [ 48946: 48946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.649328 949939 task_exit.go:204] [ 48946: 48946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.649546 949939 task_signals.go:204] [ 48946: 48951] Signal 48946, PID: 48951, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:51.649498 949939 task_signals.go:204] [ 48946: 48954] Signal 48946, PID: 48954, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:51.649838 949939 task_exit.go:204] [ 48946: 48954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.650033 949939 task_signals.go:204] [ 48946: 48953] Signal 48946, PID: 48953, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:51.651597 949939 task_exit.go:204] [ 48946: 48954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.651673 949939 task_exit.go:204] [ 48946: 48954] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:51.651852 949939 task_exit.go:204] [ 48946: 48951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.652147 949939 task_exit.go:204] [ 48946: 48951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.652240 949939 task_exit.go:204] [ 48946: 48951] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:51.652355 949939 task_exit.go:204] [ 48946: 48953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:51.658477 949939 task_exit.go:204] [ 48946: 48953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:51.658605 949939 task_exit.go:204] [ 48946: 48953] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:51.658743 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:51.659307 949939 task_exit.go:204] [ 48946: 48946] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:51 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280), &(0x7f00000002c0)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x2) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) statx(r0, &(0x7f00000000c0)='./bus\x00', 0x400, 0x1, &(0x7f0000000140)) D0620 03:40:51.726051 949939 usertrap_amd64.go:212] [ 48944: 48944] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:51.726219 949939 usertrap_amd64.go:122] [ 48944: 48944] Allocate a new trap: 0xc009a010b0 43 D0620 03:40:51.726348 949939 usertrap_amd64.go:225] [ 48944: 48944] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:51.807558 949939 usertrap_amd64.go:212] [ 48947: 48947] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:51.807677 949939 usertrap_amd64.go:122] [ 48947: 48947] Allocate a new trap: 0xc000a707b0 43 D0620 03:40:51.807733 949939 usertrap_amd64.go:225] [ 48947: 48947] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:52.096611 949939 usertrap_amd64.go:212] [ 48944: 48944] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:52.096726 949939 usertrap_amd64.go:122] [ 48944: 48944] Allocate a new trap: 0xc009a010b0 44 D0620 03:40:52.096862 949939 usertrap_amd64.go:225] [ 48944: 48944] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:52.097268 949939 usertrap_amd64.go:212] [ 48947: 48947] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:52.097336 949939 usertrap_amd64.go:122] [ 48947: 48947] Allocate a new trap: 0xc000a707b0 44 D0620 03:40:52.097421 949939 usertrap_amd64.go:225] [ 48947: 48947] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:52.101738 949939 usertrap_amd64.go:212] [ 48945: 48945] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:52.101839 949939 usertrap_amd64.go:122] [ 48945: 48945] Allocate a new trap: 0xc009c86a80 43 D0620 03:40:52.101976 949939 usertrap_amd64.go:225] [ 48945: 48945] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:52.108423 949939 task_exit.go:204] [ 48947: 48947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.109190 949939 task_signals.go:204] [ 48947: 48960] Signal 48947, PID: 48960, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.109371 949939 task_exit.go:204] [ 48947: 48960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.109207 949939 task_signals.go:204] [ 48947: 48955] Signal 48947, PID: 48955, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.109534 949939 task_exit.go:204] [ 48947: 48955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.109700 949939 task_signals.go:204] [ 48947: 48957] Signal 48947, PID: 48957, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.109938 949939 task_exit.go:204] [ 48947: 48960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.110029 949939 task_exit.go:204] [ 48947: 48960] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.110195 949939 task_exit.go:204] [ 48947: 48957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.110554 949939 task_exit.go:204] [ 48947: 48947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.110697 949939 task_exit.go:204] [ 48947: 48955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.110736 949939 task_exit.go:204] [ 48947: 48955] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.112243 949939 task_exit.go:204] [ 48944: 48944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.112704 949939 task_signals.go:204] [ 48944: 48949] Signal 48944, PID: 48949, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.112799 949939 task_signals.go:204] [ 48944: 48950] Signal 48944, PID: 48950, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.112990 949939 task_signals.go:204] [ 48944: 48948] Signal 48944, PID: 48948, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.113151 949939 task_exit.go:204] [ 48944: 48950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.113397 949939 task_signals.go:204] [ 48944: 48959] Signal 48944, PID: 48959, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.113643 949939 task_exit.go:204] [ 48944: 48949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.113905 949939 task_exit.go:204] [ 48944: 48948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.114481 949939 task_exit.go:204] [ 48944: 48948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.114579 949939 task_exit.go:204] [ 48944: 48948] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.114790 949939 task_exit.go:204] [ 48944: 48949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.114868 949939 task_exit.go:204] [ 48944: 48949] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.115031 949939 task_exit.go:204] [ 48944: 48944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.115118 949939 task_exit.go:204] [ 48944: 48959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.115206 949939 task_exit.go:204] [ 48944: 48950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.115275 949939 task_exit.go:204] [ 48944: 48950] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.117161 949939 task_exit.go:204] [ 48947: 48957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.117301 949939 task_exit.go:204] [ 48947: 48957] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.117530 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:52.118019 949939 task_exit.go:204] [ 48947: 48947] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:52 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@mcast2, @multicast2, 0xf, 0x9}}) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) (async) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:52.121864 949939 task_exit.go:204] [ 48944: 48959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.121953 949939 task_exit.go:204] [ 48944: 48959] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.122061 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:52.122685 949939 task_exit.go:204] [ 48944: 48944] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') bind$unix(r1, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)) (async) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r1, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) bind$unix(r1, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) (async) D0620 03:40:52.131021 949939 usertrap_amd64.go:212] [ 48968: 48968] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:52.131123 949939 usertrap_amd64.go:122] [ 48968: 48968] Allocate a new trap: 0xc001a6ecc0 40 D0620 03:40:52.131656 949939 usertrap_amd64.go:225] [ 48968: 48968] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:52.193244 949939 usertrap_amd64.go:212] [ 48968: 48968] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:52.193344 949939 usertrap_amd64.go:122] [ 48968: 48968] Allocate a new trap: 0xc001a6ecc0 41 D0620 03:40:52.193432 949939 usertrap_amd64.go:225] [ 48968: 48968] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:52.201625 949939 usertrap_amd64.go:212] [ 48969: 48969] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:52.201750 949939 usertrap_amd64.go:122] [ 48969: 48969] Allocate a new trap: 0xc0021b4fc0 40 D0620 03:40:52.202460 949939 usertrap_amd64.go:225] [ 48969: 48969] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:52.205924 949939 usertrap_amd64.go:212] [ 48969: 48969] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:52.205939 949939 usertrap_amd64.go:212] [ 48970: 48970] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:52.206029 949939 usertrap_amd64.go:122] [ 48969: 48969] Allocate a new trap: 0xc0021b4fc0 41 D0620 03:40:52.206055 949939 usertrap_amd64.go:122] [ 48970: 48970] Allocate a new trap: 0xc009a01470 40 D0620 03:40:52.206090 949939 usertrap_amd64.go:225] [ 48969: 48969] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:52.206600 949939 usertrap_amd64.go:225] [ 48970: 48970] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:52.209129 949939 usertrap_amd64.go:212] [ 48970: 48970] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:52.209250 949939 usertrap_amd64.go:122] [ 48970: 48970] Allocate a new trap: 0xc009a01470 41 D0620 03:40:52.209324 949939 usertrap_amd64.go:225] [ 48970: 48970] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:52.213639 949939 usertrap_amd64.go:212] [ 48968: 48968] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:52.213726 949939 usertrap_amd64.go:122] [ 48968: 48968] Allocate a new trap: 0xc001a6ecc0 42 D0620 03:40:52.213815 949939 usertrap_amd64.go:225] [ 48968: 48968] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:52.227754 949939 usertrap_amd64.go:212] [ 48970: 48970] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:52.227855 949939 usertrap_amd64.go:122] [ 48970: 48970] Allocate a new trap: 0xc009a01470 42 D0620 03:40:52.227928 949939 usertrap_amd64.go:225] [ 48970: 48970] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:52.229266 949939 usertrap_amd64.go:212] [ 48969: 48969] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:52.230624 949939 usertrap_amd64.go:122] [ 48969: 48969] Allocate a new trap: 0xc0021b4fc0 42 D0620 03:40:52.230729 949939 usertrap_amd64.go:225] [ 48969: 48969] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:52.549020 949939 usertrap_amd64.go:212] [ 48945: 48945] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:52.549144 949939 usertrap_amd64.go:122] [ 48945: 48945] Allocate a new trap: 0xc009c86a80 44 D0620 03:40:52.549231 949939 usertrap_amd64.go:225] [ 48945: 48945] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:52.985451 949939 task_exit.go:204] [ 48945: 48945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.986050 949939 task_signals.go:204] [ 48945: 48964] Signal 48945, PID: 48964, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986045 949939 task_signals.go:204] [ 48945: 48962] Signal 48945, PID: 48962, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986241 949939 task_signals.go:204] [ 48945: 48956] Signal 48945, PID: 48956, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986292 949939 task_signals.go:204] [ 48945: 48963] Signal 48945, PID: 48963, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986407 949939 task_exit.go:204] [ 48945: 48962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.986616 949939 task_signals.go:204] [ 48945: 48965] Signal 48945, PID: 48965, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986664 949939 task_signals.go:204] [ 48945: 48961] Signal 48945, PID: 48961, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986801 949939 task_signals.go:204] [ 48945: 48952] Signal 48945, PID: 48952, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986912 949939 task_signals.go:204] [ 48945: 48966] Signal 48945, PID: 48966, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986827 949939 task_signals.go:204] [ 48945: 48967] Signal 48945, PID: 48967, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.986979 949939 task_exit.go:204] [ 48945: 48945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.987137 949939 task_signals.go:204] [ 48945: 48958] Signal 48945, PID: 48958, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:52.987238 949939 task_exit.go:204] [ 48945: 48958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.987506 949939 task_exit.go:204] [ 48945: 48958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.987561 949939 task_exit.go:204] [ 48945: 48958] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.987715 949939 task_exit.go:204] [ 48945: 48956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.987946 949939 task_exit.go:204] [ 48945: 48956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.988014 949939 task_exit.go:204] [ 48945: 48956] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.988149 949939 task_exit.go:204] [ 48945: 48963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.988658 949939 task_exit.go:204] [ 48945: 48962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.988730 949939 task_exit.go:204] [ 48945: 48962] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.988845 949939 task_exit.go:204] [ 48945: 48964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.988994 949939 task_exit.go:204] [ 48945: 48965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.989073 949939 task_exit.go:204] [ 48945: 48961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.989211 949939 task_exit.go:204] [ 48945: 48952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.989362 949939 task_exit.go:204] [ 48945: 48966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.989500 949939 task_exit.go:204] [ 48945: 48967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:52.989930 949939 task_exit.go:204] [ 48945: 48963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.990051 949939 task_exit.go:204] [ 48945: 48963] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.990443 949939 task_exit.go:204] [ 48945: 48952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.990533 949939 task_exit.go:204] [ 48945: 48952] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.990871 949939 task_exit.go:204] [ 48945: 48966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.990951 949939 task_exit.go:204] [ 48945: 48966] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.991229 949939 task_exit.go:204] [ 48945: 48965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.991300 949939 task_exit.go:204] [ 48945: 48965] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.991678 949939 task_exit.go:204] [ 48945: 48967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.991742 949939 task_exit.go:204] [ 48945: 48967] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:52.992121 949939 task_exit.go:204] [ 48945: 48964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:52.992248 949939 task_exit.go:204] [ 48945: 48964] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.074122 949939 usertrap_amd64.go:212] [ 48968: 48968] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:53.074269 949939 usertrap_amd64.go:122] [ 48968: 48968] Allocate a new trap: 0xc001a6ecc0 43 D0620 03:40:53.074358 949939 usertrap_amd64.go:225] [ 48968: 48968] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:53.081194 949939 task_exit.go:204] [ 48945: 48961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.081315 949939 task_exit.go:204] [ 48945: 48961] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.081407 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:53.081540 949939 task_exit.go:204] [ 48945: 48945] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.082246 949939 task_exit.go:204] [ 48968: 48968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.082429 949939 task_signals.go:204] [ 48968: 48975] Signal 48968, PID: 48975, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.082470 949939 task_signals.go:204] [ 48968: 48971] Signal 48968, PID: 48971, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.082545 949939 task_signals.go:204] [ 48968: 48976] Signal 48968, PID: 48976, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.082560 949939 task_exit.go:204] [ 48968: 48975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.082729 949939 task_exit.go:204] [ 48968: 48976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.082942 949939 task_exit.go:204] [ 48968: 48976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.083020 949939 task_exit.go:204] [ 48968: 48976] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.083198 949939 task_exit.go:204] [ 48968: 48971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.083435 949939 task_exit.go:204] [ 48968: 48971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.083514 949939 task_exit.go:204] [ 48968: 48971] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.084153 949939 task_exit.go:204] [ 48968: 48968] Transitioning from exit state TaskExitInitiated to TaskExitZombie 03:40:53 executing program 2: r0 = getegid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340), 0x200002, &(0x7f00000002c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x33]}}, {@gid={'gid', 0x3d, r0}}, {@huge_advise}], [{@fowner_gt={'fowner>', r1}}, {@smackfshat={'smackfshat', 0x3d, '/dev/zero\x00'}}, {@smackfsroot}]}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r3, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r3, 0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000540)={{r5}, "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"}) fcntl$getownex(r5, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000380)=0xc) syz_open_procfs(r6, &(0x7f00000003c0)='wchan\x00') r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) getpeername$inet(r7, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) D0620 03:40:53.089587 949939 usertrap_amd64.go:212] [ 48970: 48970] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:53.089742 949939 usertrap_amd64.go:122] [ 48970: 48970] Allocate a new trap: 0xc009a01470 43 D0620 03:40:53.089835 949939 usertrap_amd64.go:225] [ 48970: 48970] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:53.092440 949939 usertrap_amd64.go:212] [ 48970: 48970] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:53.092538 949939 usertrap_amd64.go:122] [ 48970: 48970] Allocate a new trap: 0xc009a01470 44 D0620 03:40:53.092716 949939 usertrap_amd64.go:225] [ 48970: 48970] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:53.095818 949939 task_exit.go:204] [ 48968: 48975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.095931 949939 task_exit.go:204] [ 48968: 48975] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.096032 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:53.096341 949939 task_exit.go:204] [ 48968: 48968] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:53 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280), &(0x7f00000002c0)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x2) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async, rerun: 64) statx(r0, &(0x7f00000000c0)='./bus\x00', 0x400, 0x1, &(0x7f0000000140)) (rerun: 64) D0620 03:40:53.169696 949939 task_exit.go:204] [ 48970: 48970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.170101 949939 task_exit.go:204] [ 48970: 48970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.170253 949939 task_signals.go:204] [ 48970: 48977] Signal 48970, PID: 48977, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.170284 949939 task_signals.go:204] [ 48970: 48974] Signal 48970, PID: 48974, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.170393 949939 task_signals.go:204] [ 48970: 48972] Signal 48970, PID: 48972, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.170483 949939 task_exit.go:204] [ 48970: 48972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.170451 949939 task_signals.go:204] [ 48970: 48979] Signal 48970, PID: 48979, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.170633 949939 task_exit.go:204] [ 48970: 48979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.170857 949939 task_exit.go:204] [ 48970: 48974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.171316 949939 task_exit.go:204] [ 48970: 48979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.171526 949939 task_exit.go:204] [ 48970: 48979] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.171785 949939 task_exit.go:204] [ 48970: 48977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.172591 949939 task_exit.go:204] [ 48970: 48974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.172744 949939 task_exit.go:204] [ 48970: 48974] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.173059 949939 task_exit.go:204] [ 48970: 48972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.173225 949939 task_exit.go:204] [ 48970: 48972] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.178620 949939 task_exit.go:204] [ 48970: 48977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.178707 949939 task_exit.go:204] [ 48970: 48977] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.178846 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:53.179627 949939 task_exit.go:204] [ 48970: 48970] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.183030 949939 usertrap_amd64.go:212] [ 48969: 48969] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:53.183186 949939 usertrap_amd64.go:122] [ 48969: 48969] Allocate a new trap: 0xc0021b4fc0 43 D0620 03:40:53.183372 949939 usertrap_amd64.go:225] [ 48969: 48969] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) 03:40:53 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) fallocate(r1, 0xdfae3bf0bd296c46, 0x0, 0x21d42a8a) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) readv(r2, &(0x7f0000001380)=[{&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000001240)=""/169, 0xa9}, {&(0x7f0000001300)=""/115, 0x73}], 0x3) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) read$char_usb(r0, &(0x7f0000000240)=""/4088, 0xff8) tee(0xffffffffffffffff, r3, 0x48000, 0x1) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000001500)={0x1, 0x1, 0x2}) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') readlinkat(r1, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)=""/237, 0xed) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10) D0620 03:40:53.190608 949939 usertrap_amd64.go:212] [ 48983: 48983] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:53.190733 949939 usertrap_amd64.go:122] [ 48983: 48983] Allocate a new trap: 0xc009a015c0 40 D0620 03:40:53.191274 949939 usertrap_amd64.go:225] [ 48983: 48983] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:53.195598 949939 usertrap_amd64.go:212] [ 48983: 48983] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:53.195741 949939 usertrap_amd64.go:122] [ 48983: 48983] Allocate a new trap: 0xc009a015c0 41 D0620 03:40:53.195854 949939 usertrap_amd64.go:225] [ 48983: 48983] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:53.196906 949939 usertrap_amd64.go:212] [ 48980: 48980] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:53.197090 949939 usertrap_amd64.go:122] [ 48980: 48980] Allocate a new trap: 0xc003084720 40 D0620 03:40:53.197706 949939 usertrap_amd64.go:225] [ 48980: 48980] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:53.205398 949939 usertrap_amd64.go:212] [ 48980: 48980] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:53.205486 949939 usertrap_amd64.go:122] [ 48980: 48980] Allocate a new trap: 0xc003084720 41 D0620 03:40:53.205605 949939 usertrap_amd64.go:225] [ 48980: 48980] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:53.226167 949939 usertrap_amd64.go:212] [ 48983: 48983] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:53.226298 949939 usertrap_amd64.go:122] [ 48983: 48983] Allocate a new trap: 0xc009a015c0 42 D0620 03:40:53.226409 949939 usertrap_amd64.go:225] [ 48983: 48983] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:53.230535 949939 usertrap_amd64.go:212] [ 48980: 48980] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:53.230815 949939 usertrap_amd64.go:122] [ 48980: 48980] Allocate a new trap: 0xc003084720 42 D0620 03:40:53.230913 949939 usertrap_amd64.go:225] [ 48980: 48980] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:53.241238 949939 usertrap_amd64.go:212] [ 48984: 48984] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:53.241369 949939 usertrap_amd64.go:122] [ 48984: 48984] Allocate a new trap: 0xc0093aec30 40 D0620 03:40:53.532007 949939 usertrap_amd64.go:212] [ 48969: 48969] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:53.532122 949939 usertrap_amd64.go:122] [ 48969: 48969] Allocate a new trap: 0xc0021b4fc0 44 D0620 03:40:53.532470 949939 usertrap_amd64.go:225] [ 48969: 48969] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:53.533404 949939 usertrap_amd64.go:225] [ 48984: 48984] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:53.607343 949939 usertrap_amd64.go:212] [ 48984: 48984] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:53.607517 949939 usertrap_amd64.go:122] [ 48984: 48984] Allocate a new trap: 0xc0093aec30 41 D0620 03:40:53.607811 949939 usertrap_amd64.go:225] [ 48984: 48984] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:53.608515 949939 usertrap_amd64.go:212] [ 48980: 48989] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:40:53.608605 949939 usertrap_amd64.go:122] [ 48980: 48989] Allocate a new trap: 0xc003084720 43 D0620 03:40:53.608683 949939 usertrap_amd64.go:225] [ 48980: 48989] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:53.612700 949939 task_exit.go:204] [ 48969: 48969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.612920 949939 task_signals.go:204] [ 48969: 48978] Signal 48969, PID: 48978, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.613077 949939 task_exit.go:204] [ 48969: 48978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.613522 949939 task_signals.go:204] [ 48969: 48973] Signal 48969, PID: 48973, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.613649 949939 task_exit.go:204] [ 48969: 48973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.613886 949939 task_signals.go:204] [ 48969: 48981] Signal 48969, PID: 48981, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.613897 949939 task_signals.go:204] [ 48969: 48982] Signal 48969, PID: 48982, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:53.613967 949939 task_exit.go:204] [ 48969: 48978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.614112 949939 task_exit.go:204] [ 48969: 48978] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.614541 949939 task_exit.go:204] [ 48969: 48973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.614719 949939 task_exit.go:204] [ 48969: 48973] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.614759 949939 usertrap_amd64.go:212] [ 48983: 48983] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:53.614833 949939 usertrap_amd64.go:122] [ 48983: 48983] Allocate a new trap: 0xc009a015c0 43 D0620 03:40:53.614875 949939 task_exit.go:204] [ 48969: 48982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.614912 949939 usertrap_amd64.go:225] [ 48983: 48983] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:53.615144 949939 task_exit.go:204] [ 48969: 48982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.615221 949939 task_exit.go:204] [ 48969: 48982] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.615521 949939 task_exit.go:204] [ 48969: 48981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:53.615966 949939 task_exit.go:204] [ 48969: 48969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.619053 949939 usertrap_amd64.go:212] [ 48980: 48980] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:53.619173 949939 usertrap_amd64.go:122] [ 48980: 48980] Allocate a new trap: 0xc003084720 44 D0620 03:40:53.619264 949939 usertrap_amd64.go:225] [ 48980: 48980] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:53.622230 949939 task_exit.go:204] [ 48969: 48981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:53.622314 949939 task_exit.go:204] [ 48969: 48981] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:53.622441 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:53.623109 949939 task_exit.go:204] [ 48969: 48969] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:53 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@mcast2, @multicast2, 0xf, 0x9}}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000140)='./file0/file1\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:40:54.051597 949939 usertrap_amd64.go:212] [ 48983: 48983] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:54.051707 949939 usertrap_amd64.go:122] [ 48983: 48983] Allocate a new trap: 0xc009a015c0 44 D0620 03:40:54.051777 949939 usertrap_amd64.go:225] [ 48983: 48983] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:54.052740 949939 usertrap_amd64.go:212] [ 48980: 48980] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:54.052812 949939 usertrap_amd64.go:122] [ 48980: 48980] Allocate a new trap: 0xc003084720 45 D0620 03:40:54.052889 949939 usertrap_amd64.go:225] [ 48980: 48980] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:40:54.057353 949939 task_exit.go:204] [ 48980: 48980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.057872 949939 task_signals.go:204] [ 48980: 48986] Signal 48980, PID: 48986, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.057949 949939 task_signals.go:204] [ 48980: 48989] Signal 48980, PID: 48989, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.058230 949939 task_exit.go:204] [ 48980: 48986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.058581 949939 task_exit.go:204] [ 48980: 48980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.058767 949939 task_exit.go:204] [ 48980: 48989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.059149 949939 task_exit.go:204] [ 48980: 48986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.059235 949939 task_exit.go:204] [ 48980: 48986] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.060752 949939 task_exit.go:204] [ 48983: 48983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.061136 949939 task_signals.go:204] [ 48983: 48990] Signal 48983, PID: 48990, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.061170 949939 task_signals.go:204] [ 48983: 48988] Signal 48983, PID: 48988, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.061256 949939 task_signals.go:204] [ 48983: 48985] Signal 48983, PID: 48985, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.061225 949939 task_signals.go:204] [ 48983: 48987] Signal 48983, PID: 48987, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.061252 949939 task_exit.go:204] [ 48983: 48983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.061608 949939 task_exit.go:204] [ 48983: 48990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.061870 949939 task_exit.go:204] [ 48983: 48990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.061971 949939 task_exit.go:204] [ 48983: 48990] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.062118 949939 task_exit.go:204] [ 48983: 48988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.062229 949939 task_exit.go:204] [ 48983: 48985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.062473 949939 task_exit.go:204] [ 48983: 48985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.062539 949939 task_exit.go:204] [ 48983: 48985] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.062665 949939 task_exit.go:204] [ 48983: 48987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.062880 949939 task_exit.go:204] [ 48983: 48987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.062942 949939 task_exit.go:204] [ 48983: 48987] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.064643 949939 task_exit.go:204] [ 48980: 48989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.064738 949939 task_exit.go:204] [ 48980: 48989] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.064813 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:54.065156 949939 task_exit.go:204] [ 48980: 48980] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:54 executing program 2: r0 = getegid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340), 0x200002, &(0x7f00000002c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x33]}}, {@gid={'gid', 0x3d, r0}}, {@huge_advise}], [{@fowner_gt={'fowner>', r1}}, {@smackfshat={'smackfshat', 0x3d, '/dev/zero\x00'}}, {@smackfsroot}]}) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r3, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r3, 0x0, 0x0, 0x0) (async, rerun: 64) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (rerun: 64) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000540)={{r5}, "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"}) (async) fcntl$getownex(r5, 0x10, &(0x7f0000000100)) (async, rerun: 64) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) (rerun: 64) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000380)=0xc) syz_open_procfs(r6, &(0x7f00000003c0)='wchan\x00') (async) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) getpeername$inet(r7, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) D0620 03:40:54.128766 949939 task_exit.go:204] [ 48983: 48988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.128867 949939 task_exit.go:204] [ 48983: 48988] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.129028 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:54.129164 949939 task_exit.go:204] [ 48983: 48983] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:54 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280), &(0x7f00000002c0)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x2) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) statx(r0, &(0x7f00000000c0)='./bus\x00', 0x400, 0x1, &(0x7f0000000140)) (async) statx(r0, &(0x7f00000000c0)='./bus\x00', 0x400, 0x1, &(0x7f0000000140)) D0620 03:40:54.131979 949939 usertrap_amd64.go:212] [ 48984: 48984] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:54.132087 949939 usertrap_amd64.go:122] [ 48984: 48984] Allocate a new trap: 0xc0093aec30 42 D0620 03:40:54.132176 949939 usertrap_amd64.go:225] [ 48984: 48984] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:54.145248 949939 usertrap_amd64.go:212] [ 48991: 48991] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:54.145429 949939 usertrap_amd64.go:122] [ 48991: 48991] Allocate a new trap: 0xc00945f050 40 D0620 03:40:54.146302 949939 usertrap_amd64.go:225] [ 48991: 48991] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:54.149954 949939 usertrap_amd64.go:212] [ 48984: 48984] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:54.150067 949939 usertrap_amd64.go:122] [ 48984: 48984] Allocate a new trap: 0xc0093aec30 43 D0620 03:40:54.150178 949939 usertrap_amd64.go:225] [ 48984: 48984] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:54.151888 949939 usertrap_amd64.go:212] [ 48991: 48991] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:54.151973 949939 usertrap_amd64.go:122] [ 48991: 48991] Allocate a new trap: 0xc00945f050 41 D0620 03:40:54.152056 949939 usertrap_amd64.go:225] [ 48991: 48991] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:54.157340 949939 usertrap_amd64.go:212] [ 48993: 48993] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:54.157465 949939 usertrap_amd64.go:122] [ 48993: 48993] Allocate a new trap: 0xc0021b5050 40 D0620 03:40:54.158018 949939 usertrap_amd64.go:225] [ 48993: 48993] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:54.160497 949939 usertrap_amd64.go:212] [ 48994: 48994] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:54.160615 949939 usertrap_amd64.go:122] [ 48994: 48994] Allocate a new trap: 0xc01f00e3f0 40 D0620 03:40:54.161053 949939 task_exit.go:204] [ 48984: 48984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.161292 949939 usertrap_amd64.go:225] [ 48994: 48994] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:54.161382 949939 task_signals.go:204] [ 48984: 48992] Signal 48984, PID: 48992, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:54.161391 949939 task_exit.go:204] [ 48984: 48984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.161699 949939 task_exit.go:204] [ 48984: 48992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:54.164354 949939 usertrap_amd64.go:212] [ 48994: 48994] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:54.164431 949939 usertrap_amd64.go:122] [ 48994: 48994] Allocate a new trap: 0xc01f00e3f0 41 D0620 03:40:54.164489 949939 usertrap_amd64.go:225] [ 48994: 48994] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:54.165120 949939 usertrap_amd64.go:212] [ 48993: 48993] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:54.165208 949939 usertrap_amd64.go:122] [ 48993: 48993] Allocate a new trap: 0xc0021b5050 41 D0620 03:40:54.165285 949939 usertrap_amd64.go:225] [ 48993: 48993] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:54.166861 949939 task_exit.go:204] [ 48984: 48992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:54.166955 949939 task_exit.go:204] [ 48984: 48992] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:54.167068 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:54.167190 949939 task_exit.go:204] [ 48984: 48984] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:54 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r0) (async) r1 = dup2(0xffffffffffffffff, r0) fallocate(r1, 0xdfae3bf0bd296c46, 0x0, 0x21d42a8a) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) readv(r2, &(0x7f0000001380)=[{&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000001240)=""/169, 0xa9}, {&(0x7f0000001300)=""/115, 0x73}], 0x3) (async) readv(r2, &(0x7f0000001380)=[{&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000001240)=""/169, 0xa9}, {&(0x7f0000001300)=""/115, 0x73}], 0x3) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) (async) ioctl$FIONCLEX(r3, 0x5450) read$char_usb(r0, &(0x7f0000000240)=""/4088, 0xff8) tee(0xffffffffffffffff, r3, 0x48000, 0x1) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000001500)={0x1, 0x1, 0x2}) (async) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000001500)={0x1, 0x1, 0x2}) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') (async) chdir(&(0x7f0000000040)='./file0\x00') readlinkat(r1, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)=""/237, 0xed) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10) D0620 03:40:54.180264 949939 usertrap_amd64.go:212] [ 48991: 48991] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:54.180365 949939 usertrap_amd64.go:122] [ 48991: 48991] Allocate a new trap: 0xc00945f050 42 D0620 03:40:54.180461 949939 usertrap_amd64.go:225] [ 48991: 48991] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:54.191765 949939 usertrap_amd64.go:212] [ 48991: 48991] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:54.191797 949939 usertrap_amd64.go:212] [ 48993: 48993] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:54.191854 949939 usertrap_amd64.go:122] [ 48991: 48991] Allocate a new trap: 0xc00945f050 43 D0620 03:40:54.191906 949939 usertrap_amd64.go:122] [ 48993: 48993] Allocate a new trap: 0xc0021b5050 42 D0620 03:40:54.191976 949939 usertrap_amd64.go:225] [ 48991: 48991] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:54.191994 949939 usertrap_amd64.go:225] [ 48993: 48993] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:54.201630 949939 usertrap_amd64.go:212] [ 48998: 48998] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:54.201770 949939 usertrap_amd64.go:122] [ 48998: 48998] Allocate a new trap: 0xc0093aeea0 40 D0620 03:40:54.202677 949939 usertrap_amd64.go:225] [ 48998: 48998] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:54.206698 949939 usertrap_amd64.go:212] [ 48998: 48998] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:54.206800 949939 usertrap_amd64.go:122] [ 48998: 48998] Allocate a new trap: 0xc0093aeea0 41 D0620 03:40:54.206908 949939 usertrap_amd64.go:225] [ 48998: 48998] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:54.208323 949939 usertrap_amd64.go:212] [ 48994: 48994] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:54.208401 949939 usertrap_amd64.go:122] [ 48994: 48994] Allocate a new trap: 0xc01f00e3f0 42 D0620 03:40:54.208466 949939 usertrap_amd64.go:225] [ 48994: 48994] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) I0620 03:40:54.579083 949939 watchdog.go:295] Watchdog starting loop, tasks: 77, discount: 0s D0620 03:40:54.653248 949939 usertrap_amd64.go:212] [ 48993: 49000] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:40:54.653401 949939 usertrap_amd64.go:122] [ 48993: 49000] Allocate a new trap: 0xc0021b5050 43 D0620 03:40:54.653530 949939 usertrap_amd64.go:225] [ 48993: 49000] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:55.064023 949939 usertrap_amd64.go:212] [ 48991: 48991] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:55.064114 949939 usertrap_amd64.go:122] [ 48991: 48991] Allocate a new trap: 0xc00945f050 44 D0620 03:40:55.064194 949939 usertrap_amd64.go:225] [ 48991: 48991] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:55.066071 949939 usertrap_amd64.go:212] [ 48998: 48998] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:55.066167 949939 usertrap_amd64.go:122] [ 48998: 48998] Allocate a new trap: 0xc0093aeea0 42 D0620 03:40:55.066238 949939 usertrap_amd64.go:225] [ 48998: 48998] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:55.067531 949939 usertrap_amd64.go:212] [ 48994: 48994] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:55.067593 949939 usertrap_amd64.go:122] [ 48994: 48994] Allocate a new trap: 0xc01f00e3f0 43 D0620 03:40:55.067710 949939 usertrap_amd64.go:225] [ 48994: 48994] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:55.071776 949939 usertrap_amd64.go:212] [ 48993: 48993] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:55.071851 949939 usertrap_amd64.go:122] [ 48993: 48993] Allocate a new trap: 0xc0021b5050 44 D0620 03:40:55.071934 949939 usertrap_amd64.go:225] [ 48993: 48993] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:55.073873 949939 task_exit.go:204] [ 48994: 48994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.074197 949939 task_signals.go:204] [ 48994: 49001] Signal 48994, PID: 49001, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.074220 949939 task_signals.go:204] [ 48994: 49005] Signal 48994, PID: 49005, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.074442 949939 task_signals.go:204] [ 48994: 49006] Signal 48994, PID: 49006, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.074520 949939 task_signals.go:204] [ 48994: 49002] Signal 48994, PID: 49002, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.074619 949939 task_exit.go:204] [ 48994: 48994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.074825 949939 task_exit.go:204] [ 48994: 49001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.074935 949939 task_exit.go:204] [ 48994: 49005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.075231 949939 task_exit.go:204] [ 48994: 49005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.075276 949939 task_exit.go:204] [ 48994: 49005] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.075433 949939 task_exit.go:204] [ 48994: 49006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.075671 949939 task_exit.go:204] [ 48994: 49006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.075774 949939 task_exit.go:204] [ 48994: 49006] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.075852 949939 task_exit.go:204] [ 48994: 49002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.076308 949939 task_exit.go:204] [ 48994: 49001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.076379 949939 task_exit.go:204] [ 48994: 49001] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.076566 949939 task_exit.go:204] [ 48991: 48991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.076787 949939 task_exit.go:204] [ 48991: 48991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.076797 949939 task_signals.go:204] [ 48991: 48997] Signal 48991, PID: 48997, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.076891 949939 task_signals.go:204] [ 48991: 48996] Signal 48991, PID: 48996, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.077023 949939 task_exit.go:204] [ 48991: 48997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.077408 949939 task_exit.go:204] [ 48991: 48996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.077630 949939 task_exit.go:204] [ 48991: 48996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.077693 949939 task_exit.go:204] [ 48991: 48996] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.078349 949939 task_exit.go:204] [ 48991: 48997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.078503 949939 task_exit.go:204] [ 48991: 48997] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.081823 949939 task_signals.go:204] [ 48991: 48995] Signal 48991, PID: 48995, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.081945 949939 task_exit.go:204] [ 48991: 48995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.083184 949939 task_exit.go:204] [ 48994: 49002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.083280 949939 task_exit.go:204] [ 48994: 49002] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.083424 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:55.083785 949939 task_exit.go:204] [ 48994: 48994] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 0: r0 = open(&(0x7f0000000140)='./bus/file0\x00', 0x185202, 0x6d) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) setrlimit(0x2, &(0x7f00000000c0)={0x4, 0x9}) D0620 03:40:55.087716 949939 task_exit.go:204] [ 48991: 48995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.087817 949939 task_exit.go:204] [ 48991: 48995] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.087920 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:55.090359 949939 task_exit.go:204] [ 48991: 48991] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x0, 0x100000001, 0x4}) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x3) statfs(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)=""/42) D0620 03:40:55.153538 949939 usertrap_amd64.go:212] [ 48998: 48998] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:55.153643 949939 usertrap_amd64.go:122] [ 48998: 48998] Allocate a new trap: 0xc0093aeea0 43 D0620 03:40:55.153744 949939 usertrap_amd64.go:225] [ 48998: 48998] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:55.159747 949939 task_exit.go:204] [ 48998: 48998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.160293 949939 task_signals.go:204] [ 48998: 49008] Signal 48998, PID: 49008, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.160430 949939 task_signals.go:204] [ 48998: 49007] Signal 48998, PID: 49007, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.160560 949939 task_exit.go:204] [ 48998: 49007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.160806 949939 task_exit.go:204] [ 48998: 49007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.160873 949939 task_exit.go:204] [ 48998: 49007] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.161091 949939 task_exit.go:204] [ 48998: 48998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.161218 949939 task_exit.go:204] [ 48998: 49008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.165615 949939 task_exit.go:204] [ 48998: 49008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.165705 949939 task_exit.go:204] [ 48998: 49008] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.165808 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:55.166762 949939 task_exit.go:204] [ 48998: 48998] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) fallocate(r1, 0xdfae3bf0bd296c46, 0x0, 0x21d42a8a) (async, rerun: 64) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) (rerun: 64) readv(r2, &(0x7f0000001380)=[{&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000001240)=""/169, 0xa9}, {&(0x7f0000001300)=""/115, 0x73}], 0x3) (async) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) (async) read$char_usb(r0, &(0x7f0000000240)=""/4088, 0xff8) (async) tee(0xffffffffffffffff, r3, 0x48000, 0x1) (async, rerun: 64) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000001500)={0x1, 0x1, 0x2}) (rerun: 64) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') readlinkat(r1, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)=""/237, 0xed) (async, rerun: 32) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10) (rerun: 32) D0620 03:40:55.168379 949939 usertrap_amd64.go:212] [ 49009: 49009] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:55.168493 949939 usertrap_amd64.go:122] [ 49009: 49009] Allocate a new trap: 0xc001a6f1d0 40 D0620 03:40:55.169279 949939 usertrap_amd64.go:225] [ 49009: 49009] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:55.171859 949939 usertrap_amd64.go:212] [ 48993: 48993] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:55.171919 949939 usertrap_amd64.go:122] [ 48993: 48993] Allocate a new trap: 0xc0021b5050 45 D0620 03:40:55.171986 949939 usertrap_amd64.go:225] [ 48993: 48993] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:40:55.172765 949939 usertrap_amd64.go:212] [ 49009: 49009] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:55.172835 949939 usertrap_amd64.go:122] [ 49009: 49009] Allocate a new trap: 0xc001a6f1d0 41 D0620 03:40:55.172903 949939 usertrap_amd64.go:225] [ 49009: 49009] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:55.176907 949939 usertrap_amd64.go:212] [ 49010: 49010] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:55.177082 949939 usertrap_amd64.go:122] [ 49010: 49010] Allocate a new trap: 0xc002380c30 40 D0620 03:40:55.177787 949939 usertrap_amd64.go:225] [ 49010: 49010] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:55.179828 949939 task_exit.go:204] [ 48993: 48993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.180107 949939 task_exit.go:204] [ 48993: 48993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.180196 949939 usertrap_amd64.go:212] [ 49010: 49010] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:55.180247 949939 usertrap_amd64.go:122] [ 49010: 49010] Allocate a new trap: 0xc002380c30 41 D0620 03:40:55.180317 949939 task_signals.go:204] [ 48993: 49003] Signal 48993, PID: 49003, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.180372 949939 usertrap_amd64.go:225] [ 49010: 49010] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:55.180347 949939 task_signals.go:204] [ 48993: 48999] Signal 48993, PID: 48999, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.180488 949939 task_signals.go:204] [ 48993: 49004] Signal 48993, PID: 49004, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.180480 949939 task_signals.go:204] [ 48993: 49000] Signal 48993, PID: 49000, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.180543 949939 task_exit.go:204] [ 48993: 48999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.180868 949939 task_exit.go:204] [ 48993: 49004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.181135 949939 task_exit.go:204] [ 48993: 49003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.181454 949939 task_exit.go:204] [ 48993: 49003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.181526 949939 task_exit.go:204] [ 48993: 49003] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.181736 949939 task_exit.go:204] [ 48993: 49000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.182040 949939 task_exit.go:204] [ 48993: 49000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.182112 949939 task_exit.go:204] [ 48993: 49000] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.182493 949939 task_exit.go:204] [ 48993: 48999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.182556 949939 task_exit.go:204] [ 48993: 48999] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.187449 949939 usertrap_amd64.go:212] [ 49009: 49009] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:55.187512 949939 usertrap_amd64.go:122] [ 49009: 49009] Allocate a new trap: 0xc001a6f1d0 42 D0620 03:40:55.187618 949939 usertrap_amd64.go:225] [ 49009: 49009] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:55.189690 949939 task_exit.go:204] [ 48993: 49004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.189733 949939 task_exit.go:204] [ 48993: 49004] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.189816 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:55.189970 949939 task_exit.go:204] [ 48993: 48993] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 2: r0 = getegid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340), 0x200002, &(0x7f00000002c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x33]}}, {@gid={'gid', 0x3d, r0}}, {@huge_advise}], [{@fowner_gt={'fowner>', r1}}, {@smackfshat={'smackfshat', 0x3d, '/dev/zero\x00'}}, {@smackfsroot}]}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r3, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r3, 0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000540)={{r5}, "3200b672477bc8d980b0531b168f77c0bd8c36e380b5f3b867cd7844adea6a501f141348507636f060a838e7785faa282207f77467058f6eb482bf18ebc7fc5143bb2d749900e522ef8548d155b7178cf0df2481d955f191470683b1d82efd93c1777941c3d81e66084dfe63a1bf441570be791e8dc390404415126480993dc31b7959e44c9aa869191f68793ee36de292748c3817cb89660cc7456b2ad4c1547ee6e2d9afc3a6d0017eb293f4fde39ac27e60a93be564b1fcbef87f3fffb609d95a6367b660487a3f38ec38d3d53b59a1b94d6178700051991f1e367f40f2c1e6db4b457ce167c1dcf189bcb3081686bb36060b69199e3b4b029ca1409374bb08b667e5d2c95d80a9104c1d09ede773cb1986b0d352f6de66895c5b97f06f781ee2373651451c61bc50438814cfd3e7c30578ed37c96fdfd83a1b8c90fcbbd3bbe2e641fd2c57d4586a1d19936c4e9da52607aa201c6341bef2101cbdf0963b3b6340eb158508616590e4d10a528cb6d1a86e15f736b980a2f1ef8e24af28339d4472e8371ee6418192da8c9eb91ed90c24161bcdff11b9b06cb4fdfb42a22c8eff442518a1b6670fed8237c450dc7b8da7520980bc86be3dbc3f37f6d8c65c6d368f341737df2f6f1e334e43b57c73640dcf2496a25a4cca9becb7d112c53634f81169768c0ca9e853c962a8310243d66c1531a0af3f69dab62e1912e82a20b881a051a18d8ed9f4a106ddc533fc4892386340c34bd9dc244570a5710f606fda335cc36b82af13688219e9b7d36231c059fa3caf478538c00f93ddd8067f14554835cbd5d441350e78f89a8a6e9c99fd2777be8cb4b731d241249e430814809e5c994f25e9f6e4f2110e27ac35b153c87146c0a0083d702fded591bc74a2abcbe5f0bf8c2d261a29dad968eecfd84b3a94b8daedc68d9bc340aac6549b0a62943a98b01bb322013ef93d0ab412ce930cb3801d7b0933fe6d929e5b65c2e49df307e915e19f228f0c3b1fe1f73aee371ae7551cf8a87824448182b4e8817897ecbdf11cbf3f0c746b33142b9b3ef457abc0302834fff219702dbff3366986812ab945c5f4467f40e88c4a2216f683ec9f192adb37053f8b98ed2146dc7c3cd6a2f6a01aa00bc61914107e437aad6801292894d4346bd4483386b9982aa995480d0b9e761d1609622949cb47e5ee8c3b4a5c539ee573108c38aa1a392efe29a54f640d4987ea3460421e5f2d8b2b7cdf9a240c6da11bc85d6d4f6da6171badcf36ffa79706bd6afac07266e9618f5c66b144d22788fb0dff5445676964a9a2932d21d6b607459ae605e15a3e33a239b0889ce4b9cc7ef5e0f34f15fbfb4b4e09f64c9f95a3846b998f5264a8adf179b645621de04b9b20c581fbca44901f6d8b7b8cd08d3bdeeaf9b61f0d216e075a84bb03d8bf1bd1f8bce020310f6e3d6a8356f0e649caea660206f365834412e514297cc3c6817b05bdfc28c440fbdd52f1232e4d42131735aea9cc3b65fb58efa0e3711b36bcfb5791b401c84f563fe49cfa3a910a614015bc9bfce861ca2ced6cb4233d3f265c7fe3195863de300f0f44bdeaaef52b734d052d3f88df6d2b46bcddb3a4d19561c658a6b2c4d03cec9b5612f6e878f0502f31df873924797a4d6d28313b56df8bf52a0954503ff0e1a3b2aee610a8fcc9311c774de0f1d801439fbba5df636abe776d272a809d464723d70c22eb0aa3c363e8f10176c130ac9e167b3c0d3f9ee1f49a7764e4201d509d459b3621a90e72b549a05a64b814696ba8203467bd53c87aad3961e561bc7869efbe54b3f4733dd236b61e2ae5223cd17737d70e6153fde9d495a44eca4628b0d91b1292a465a40a11f81c09bb7be9146cd8784a45ea8b3b7a2f2c8024e674f0dc5ed58edb75c96fc3c4c82d648d4a97905d2b62c509545a85ea5bf01fcb50ae1725fae93286a69d6870637a7ad4b4fbae5de7c5e6fb6afee5f24f86645ba901e9b37ece45dc5b7adb6924f63e7ea5edc47fa6cb1de4c59863b8991f63ce0fc25b79c7a8596de9ed1f74d59b352e7c1ced0f0284f51c0c5669c791870ef002a69303c9ef674d9e1fb98b86570bc9c326befb19908c266b20d0375ea88eddde7bd51522d413fd08dbb40cde4e45af7ab64f896e5da9a51c71098e07c4c961b6fd99c9f6ea6e03eeae7f8f949f1804f529f28ba30d8072691ec685cc1a25307046c7c3d66cb1e5be967826f94dfcbcbfdef63b38f3de3f85698b0dc3609adbe97490f9a9068624d484f2993c4eee2b41f9acdf3795a9ac6e864fe4f5d89ba2f8ceee8043742cb0705660794fdf3431b164d793e8c06aae8b63999134a4765727a51fdcaa2ad9fd3018a8b22eb481bd4b4ae45bceb58b4034ec2edd32734c7e6241e7fe10b02d5ef9813460a1fae990bc7b777eb706ceb5edcc0777d7b3cc453dc1dad8bdf7b068691284a94f71f43937bf8346a89a85c914f7c56c4f5794f7641938b5e49280dd559c0057708321082a4ca3065079b49ef233e4085d1d3e27532d653599165973d739e9566ff99ccaa556b83ea959552c7a5cd6aa0f31e65f27cc351477adb043d55110c8fc8e4ad2cf86c103d0160b93d9580edc0b196b4c5a047a2c5ce20250f4cf0ae6717b7503469195c560665a4e9e82be547f9d0a679431b800922b09e77ea53c6d0fdbfad8736f05c58ea4c82a9944eb05c81a255de18b80ea258d260fb89c5cb69bf01f5f6c937e9727ef146439ab47d533529af6ae27a8bae9a92b54aff8b1f70a96019616f39e1260d6ba81b87f6c8f50c0c6393ed3a07167e98c7453553d6af252888041eb1fc19ea3f21b674f04d32fb4cd9d3b20720215ed77e043ef60ea628ed539e52899df8102764575b8559977d45230cb86c56aaea9e69d8c12a7b9a4924bba44403c67ba8e3266c940007add7de99f70385a812e11a7f34b34e75d011bfbaa86e6c84fa503d31c64a6896f708a6b294da49be4d8e413136e8e65ec2a51c9e503a98ee88906881fc2fe5e11aa3adc2b00df5b8cb0ce6a48fd1e1152f497a1009086bd5b0e139e7206452a0887350b6b1e3a33dc32408a86c1126be553c4d7e43cd8c6b8de04cdac7944a91f1735cb08d4fc8d279ead14e9e82b448423227edcef5a07e050935699dafedca7d0a538f9650473e2878d862ad719f9bc6e85f2789e15678932d29717d7ece7710f68a9b02660c8c9eb77a1233410023387b17218e81f7b41b7a02daccd72cc935dae0d387bcd26a98fae6070c7aa19f69461640eac42047c717d5fd36a948a7f6d70d8887c1e19f95e6bf79c784de94fecd2b7205ef47f021cb3dabbeb11a037b496135fc4be9bade125e029b965fefaf292929675f1abec5e8c8206475297c20a68781c1268df27fee37a5f58ab55cd0a47058282b91e05e605fbe4a5d4c82184dbf7c9cdc69b3409bf5674c3160d2696d207dbf1e03e04f23dd364dfcfef76febe1131e9b604239be154c27b832a1b9a8c39129a69c1ed8ef8fcb26ba780c4212e89130da75b990b597ad43e176cec82ca7dac696bca02874fb7206ec21fc1d794e3d4031e008d1758e250b434a382612fc81543a5f8f0b900dbdace7ce5358622a7204091da64ebe2f4dca47f6ad7295f45232b1ae0877f492f18f0343a6ab65b9aa2e24cb46c66fdf1b229a7fe7cd1f6f119749be0b79d51865fec7d211904ba6ff241d1f694ef93931eab4bfb02c68acff9875d9e1daf586b56e20eff76ce45c25e1c3a5c5a96442a0f19ef0c3b555523bd5d4ed09ab6304a449f5826334bf3e676badc3b4c168df946188c31c93d7f857eaf96154037dddcbb1b4d857db102fb54808dc417e8055142f245bc19c7c8a315db779e8e2a230016c0da94d55577b73af1f5f571bcf841f9d07df9745cc32e1a9acb0369acaacb801a6920f4218e369ce69c47fc4311d67833daa77285ae7920accad7de91e4045b955d53bab82c379c12d1cc969dcee9c4061300085704fe977b47712af7417bcfdb81263a7c6258aa289ffc671406740632e9f1a9f0a9d339b849d6e63ffe15c99f10180ee57ba6177a3d65cc2e3f75ba6feeb0a8ca76d35812bc12ad341d3f619078de59b0d4c34bc6ad062dcb0fc93200fb0593d732536ea121b7cdd7f61894a3a36e79ac2dde9fdc76482e05aecdc29289a812050314456a39de57fff148e457b9c4e66050de493d4b43f7661806952019477810449870462b7a22a36b0c98958908c68240e5b57dbb9f9d71a48259c116a79e1c5bf939f310fbdb77b7dde6ce989f7d4f538dfbe136ff0c29031e8f97278fb7c62869277c25a139391776b5482251a63097e062d6b0ee72bfe6a680dfc078ed46f13fd206d4bf5b8e9a80556c86d72236e1170c3fd6e17d837216b9e7486da805fa0ec216f2a283b7cc27e2c951abc83dd37dd657b8d7ee3f224ec9fd42937a3dad91eabc722d1fcc0a194336552336cb719613e9ed20fe8f29fae4e0fa4f08b8f5f8ef65a7358677fa28b9673b65bcee72d535bb558e1ecbc9a9413ba21f40709e47533bbc2de6808c0db940b3a2accc75f6551761ceceeb930ff32f52bb8b712f4966a6db68f34fd16fe8a41f8f15bdd3a2b5aba2861167ce7a2587a1c55d1ca6fe42044e5556cdbbe922b1e749f39203d1b4162e5c116970fef673ff62dcfdd5d23d92f67737e905bf39dc1ca541b9c27de9b5403c893f8a5968fb053c196fd3acbcda753e1895bffc675a7495ce64fe2c30c8fc467b54cf9350d265fb33e665fcb2d742408e274ff33022073c8f363b96f55f5defe5958d455bbd71c33077b6f32aa02e9768d2437ee32750fc4ba7754aa4bb8908cbedb6cf1f57375d7b3bc909115b5b18183f0bf9d5650635cc6a11a0218e610f498deb015aa358e45565c1ab8e7f923cce1ce093495254b005bc16b6c190a0885c25f5477da7f15b6d22a0cd08112a0f03eb2af4a06b0eab6c5f347a1014ad093402180470e4a9b36648114143d6636f5e087f621ec8f61b728bfb46dab84d7c5b049b7e7bac5afa4ff6a7483ceef4865b02b25455af38e5c22ddb1e0f88d5eedd4ff09bdf532395b5855233c3153063e0f44c23eef203ccbf5954892a777912b0bd1819be7d0112b1295e381f40c3d8bd3332b561e972e34b877361dde8d64f699246de8a58b2bf03b89f63131a009729fc0b438d7d0e18f3c85819cada8ea0564e79c35da4a03e433de64750787ae597656d0b3ba62e59945c53d648e83dd89b8b55c5e01dd3af3ac679d3b61430e4c615b5cecbab4e202129e397024656807bf06baa908be5ceeeb24d007234bebf55673e397dd2ca2827deb9b3b7f632289f2ce60ed59bbb1764615823e0b84934802f2bd26bab4a65a1d91e47fd9965823a28b1c19ec1e8378b10d24e8196e633fde71254bf2e4f06c7c4ecfc5f9ebcc371ef12a584a86bc356f27742c5eaf1c83dafbed93fffe33952882708df669b41caae6f71ab90b860e86558978e78cdcfe06ca63bcaa6c7f4a5b4fb124e4e9dd5412d312929614b4ee02059b0f3d45f0e396f5180baa7fdf379c5368918545789d7b355743e93ba2787c77414f33f19a736164be01dd1396ea3416917104dbff63a67f9bedea1a2623ffa5805ae8b28cb00eb7e86e7e85a63e5755d6e321403167a545a118b3c6e7f97d81c0d3830ddbf53bf6e4fd1e188317663fcf2bbfc3d89ac0b365e90b4304563f1e7cb0f120e4b67aa25bb74dbd08782750279b241c793c26c308575c38fa0cb6384acc690d5339e1bbbfa14f372ed"}) fcntl$getownex(r5, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000380)=0xc) syz_open_procfs(r6, &(0x7f00000003c0)='wchan\x00') r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) getpeername$inet(r7, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) getegid() (async) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) (async) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340), 0x200002, &(0x7f00000002c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x33]}}, {@gid={'gid', 0x3d, r0}}, {@huge_advise}], [{@fowner_gt={'fowner>', r1}}, {@smackfshat={'smackfshat', 0x3d, '/dev/zero\x00'}}, {@smackfsroot}]}) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r3, 0x0) (async) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) accept4$inet(r3, 0x0, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000540)={{r5}, "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"}) (async) fcntl$getownex(r5, 0x10, &(0x7f0000000100)) (async) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) (async) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) (async) syz_open_procfs(r6, &(0x7f00000003c0)='wchan\x00') (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) (async) getpeername$inet(r7, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) (async) D0620 03:40:55.195009 949939 usertrap_amd64.go:212] [ 49009: 49009] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:55.195117 949939 usertrap_amd64.go:122] [ 49009: 49009] Allocate a new trap: 0xc001a6f1d0 43 D0620 03:40:55.195226 949939 usertrap_amd64.go:225] [ 49009: 49009] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:55.197289 949939 usertrap_amd64.go:212] [ 49011: 49011] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:55.197403 949939 usertrap_amd64.go:122] [ 49011: 49011] Allocate a new trap: 0xc001a6f290 40 D0620 03:40:55.197980 949939 usertrap_amd64.go:225] [ 49011: 49011] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:55.198928 949939 usertrap_amd64.go:212] [ 49010: 49010] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:55.199003 949939 usertrap_amd64.go:122] [ 49010: 49010] Allocate a new trap: 0xc002380c30 42 D0620 03:40:55.199089 949939 usertrap_amd64.go:225] [ 49010: 49010] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:55.199635 949939 task_exit.go:204] [ 49009: 49009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.199909 949939 task_exit.go:204] [ 49009: 49009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.200230 949939 task_signals.go:204] [ 49009: 49012] Signal 49009, PID: 49012, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.200631 949939 task_exit.go:204] [ 49009: 49012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.201055 949939 usertrap_amd64.go:212] [ 49011: 49011] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:55.201133 949939 usertrap_amd64.go:122] [ 49011: 49011] Allocate a new trap: 0xc001a6f290 41 D0620 03:40:55.201229 949939 usertrap_amd64.go:225] [ 49011: 49011] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:55.206433 949939 task_exit.go:204] [ 49009: 49012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.206578 949939 task_exit.go:204] [ 49009: 49012] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.206679 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:55.206820 949939 task_exit.go:204] [ 49009: 49009] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 0: r0 = open(&(0x7f0000000140)='./bus/file0\x00', 0x185202, 0x6d) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) setrlimit(0x2, &(0x7f00000000c0)={0x4, 0x9}) D0620 03:40:55.220433 949939 usertrap_amd64.go:212] [ 49011: 49011] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:55.220537 949939 usertrap_amd64.go:122] [ 49011: 49011] Allocate a new trap: 0xc001a6f290 42 D0620 03:40:55.220619 949939 usertrap_amd64.go:225] [ 49011: 49011] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:55.221068 949939 usertrap_amd64.go:212] [ 49014: 49014] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:55.221195 949939 usertrap_amd64.go:122] [ 49014: 49014] Allocate a new trap: 0xc002b2f200 40 D0620 03:40:55.221841 949939 usertrap_amd64.go:225] [ 49014: 49014] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:55.224893 949939 usertrap_amd64.go:212] [ 49014: 49014] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:55.224998 949939 usertrap_amd64.go:122] [ 49014: 49014] Allocate a new trap: 0xc002b2f200 41 D0620 03:40:55.225103 949939 usertrap_amd64.go:225] [ 49014: 49014] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:55.227888 949939 usertrap_amd64.go:212] [ 49015: 49015] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:55.227978 949939 usertrap_amd64.go:122] [ 49015: 49015] Allocate a new trap: 0xc0066f2de0 40 D0620 03:40:55.228558 949939 usertrap_amd64.go:225] [ 49015: 49015] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:55.231745 949939 usertrap_amd64.go:212] [ 49015: 49015] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:55.231811 949939 usertrap_amd64.go:122] [ 49015: 49015] Allocate a new trap: 0xc0066f2de0 41 D0620 03:40:55.231916 949939 usertrap_amd64.go:225] [ 49015: 49015] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:55.238831 949939 usertrap_amd64.go:212] [ 49014: 49014] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:55.238961 949939 usertrap_amd64.go:122] [ 49014: 49014] Allocate a new trap: 0xc002b2f200 42 D0620 03:40:55.239028 949939 usertrap_amd64.go:225] [ 49014: 49014] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:55.314593 949939 usertrap_amd64.go:212] [ 49011: 49011] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:55.314723 949939 usertrap_amd64.go:122] [ 49011: 49011] Allocate a new trap: 0xc001a6f290 43 D0620 03:40:55.314853 949939 usertrap_amd64.go:225] [ 49011: 49011] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:55.315115 949939 usertrap_amd64.go:212] [ 49015: 49015] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:55.315245 949939 usertrap_amd64.go:122] [ 49015: 49015] Allocate a new trap: 0xc0066f2de0 42 D0620 03:40:55.315337 949939 usertrap_amd64.go:225] [ 49015: 49015] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:55.317136 949939 usertrap_amd64.go:212] [ 49011: 49011] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:55.317220 949939 usertrap_amd64.go:122] [ 49011: 49011] Allocate a new trap: 0xc001a6f290 44 D0620 03:40:55.317334 949939 usertrap_amd64.go:225] [ 49011: 49011] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:55.317372 949939 usertrap_amd64.go:212] [ 49014: 49020] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:40:55.317494 949939 usertrap_amd64.go:122] [ 49014: 49020] Allocate a new trap: 0xc002b2f200 43 D0620 03:40:55.317595 949939 usertrap_amd64.go:225] [ 49014: 49020] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:55.322814 949939 usertrap_amd64.go:212] [ 49015: 49015] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:55.322886 949939 usertrap_amd64.go:122] [ 49015: 49015] Allocate a new trap: 0xc0066f2de0 43 D0620 03:40:55.322954 949939 usertrap_amd64.go:225] [ 49015: 49015] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:55.326225 949939 task_exit.go:204] [ 49011: 49011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.326416 949939 task_signals.go:204] [ 49011: 49017] Signal 49011, PID: 49017, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.327419 949939 task_signals.go:204] [ 49011: 49018] Signal 49011, PID: 49018, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.327791 949939 task_signals.go:204] [ 49011: 49016] Signal 49011, PID: 49016, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.327924 949939 task_exit.go:204] [ 49011: 49017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.328196 949939 task_exit.go:204] [ 49011: 49018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.328461 949939 task_exit.go:204] [ 49011: 49018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.328545 949939 task_exit.go:204] [ 49011: 49018] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.329344 949939 task_signals.go:204] [ 49015: 49023] Signal 49015, PID: 49023, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.329420 949939 task_signals.go:204] [ 49015: 49024] Signal 49015, PID: 49024, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.329500 949939 task_exit.go:204] [ 49015: 49023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.329613 949939 task_signals.go:204] [ 49015: 49022] Signal 49015, PID: 49022, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.329744 949939 task_exit.go:204] [ 49011: 49016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.329884 949939 task_exit.go:204] [ 49015: 49015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.330234 949939 task_exit.go:204] [ 49015: 49024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.331440 949939 task_exit.go:204] [ 49015: 49024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.331506 949939 task_exit.go:204] [ 49015: 49024] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.331643 949939 task_exit.go:204] [ 49011: 49011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.332083 949939 task_exit.go:204] [ 49015: 49022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.332340 949939 task_exit.go:204] [ 49015: 49023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.332427 949939 task_exit.go:204] [ 49015: 49023] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.332587 949939 task_exit.go:204] [ 49011: 49017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.332658 949939 task_exit.go:204] [ 49011: 49017] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.332801 949939 task_exit.go:204] [ 49015: 49015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.338014 949939 usertrap_amd64.go:212] [ 49014: 49014] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:55.338128 949939 usertrap_amd64.go:122] [ 49014: 49014] Allocate a new trap: 0xc002b2f200 44 D0620 03:40:55.338212 949939 usertrap_amd64.go:225] [ 49014: 49014] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:55.338362 949939 task_exit.go:204] [ 49015: 49022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.338425 949939 task_exit.go:204] [ 49015: 49022] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.338535 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:55.338882 949939 task_exit.go:204] [ 49015: 49015] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.339217 949939 task_exit.go:204] [ 49011: 49016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.339298 949939 task_exit.go:204] [ 49011: 49016] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.339390 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 03:40:55 executing program 0: r0 = open(&(0x7f0000000140)='./bus/file0\x00', 0x185202, 0x6d) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) setrlimit(0x2, &(0x7f00000000c0)={0x4, 0x9}) open(&(0x7f0000000140)='./bus/file0\x00', 0x185202, 0x6d) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) setrlimit(0x2, &(0x7f00000000c0)={0x4, 0x9}) (async) D0620 03:40:55.339909 949939 task_exit.go:204] [ 49011: 49011] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 1: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x3a, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e22, 0x0, 'lblcr\x00', 0x12, 0x5, 0x53}, 0x2c) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x2c2540, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./bus\x00', 0x9842, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{}, {@default_permissions}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x3a00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x6}}], [{@permit_directio}]}}, 0x0, 0x0, &(0x7f0000000380)="434221138c2c73e46357aa570b00481f94b8a8a08b6160e6b6821b44e5bbe475c521627a2b4b7da619d53959e48eace2b0e06b94e358aad0b660590858a3760b9b0d946b49d0f4c22ef483f93e87f076c3103fd22a3076d19eff8a72753920a36bf14d04e25d92c368b0ab04ec28ac79312c4ce45acfa39c2c00c09ffb080b7a63b800b883ad4f1877995fa46cf6a1ef27e5533b3f93bc98") mount$tmpfs(0x0, &(0x7f0000000640)='./bus\x00', &(0x7f0000000680), 0x40000, &(0x7f00000006c0)={[{@huge_always}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x38]}}, {@nr_blocks}], [{@subj_user={'subj_user', 0x3d, 'blksize'}}, {@dont_hash}, {@flag='ro'}, {@euid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x33, 0x33, 0x31, 0x34, 0x30, 0x35, 0x39], 0x2d, [0x36, 0x33, 0x34], 0x2d, [0x33, 0x62, 0x39, 0x30], 0x2d, [0x34, 0x33, 0x39, 0x31], 0x2d, [0x63, 0x65, 0x36, 0x35, 0x66, 0x35, 0x61, 0x64]}}}, {@smackfsdef={'smackfsdef', 0x3d, '%-\xa7*-&$).#2#/'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cache=loose'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@audit}]}) mount$9p_rdma(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x80, &(0x7f0000000540)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x1ff}}, {@timeout={'timeout', 0x3d, 0x4}}, {@timeout={'timeout', 0x3d, 0x5}}, {@common=@cache_loose}, {@timeout={'timeout', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@smackfsroot={'smackfsroot', 0x3d, 'allow_other'}}]}}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:55.421408 949939 usertrap_amd64.go:212] [ 49010: 49010] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:55.421512 949939 usertrap_amd64.go:122] [ 49010: 49010] Allocate a new trap: 0xc002380c30 43 D0620 03:40:55.421602 949939 usertrap_amd64.go:225] [ 49010: 49010] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:55.718910 949939 usertrap_amd64.go:212] [ 49010: 49010] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:55.719065 949939 usertrap_amd64.go:122] [ 49010: 49010] Allocate a new trap: 0xc002380c30 44 D0620 03:40:55.719185 949939 usertrap_amd64.go:225] [ 49010: 49010] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:55.741356 949939 task_signals.go:204] [ 49010: 49013] Signal 49010, PID: 49013, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.741379 949939 task_signals.go:204] [ 49010: 49021] Signal 49010, PID: 49021, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.741346 949939 task_signals.go:204] [ 49010: 49029] Signal 49010, PID: 49029, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.741509 949939 task_exit.go:204] [ 49010: 49013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.741703 949939 task_exit.go:204] [ 49010: 49029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.742014 949939 task_exit.go:204] [ 49010: 49029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.742097 949939 task_exit.go:204] [ 49010: 49029] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.742303 949939 task_exit.go:204] [ 49010: 49021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.742527 949939 task_exit.go:204] [ 49010: 49021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.742593 949939 task_exit.go:204] [ 49010: 49021] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.742774 949939 task_exit.go:204] [ 49010: 49010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.743322 949939 task_exit.go:204] [ 49010: 49010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.749839 949939 task_exit.go:204] [ 49010: 49013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.749927 949939 task_exit.go:204] [ 49010: 49013] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.750032 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:55.751446 949939 task_exit.go:204] [ 49010: 49010] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:55 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x0, 0x100000001, 0x4}) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x3) (async) statfs(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)=""/42) D0620 03:40:55.758760 949939 usertrap_amd64.go:212] [ 49030: 49030] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:55.758898 949939 usertrap_amd64.go:122] [ 49030: 49030] Allocate a new trap: 0xc001a6f3b0 40 D0620 03:40:55.759822 949939 usertrap_amd64.go:225] [ 49030: 49030] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:55.762900 949939 usertrap_amd64.go:212] [ 49030: 49030] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:55.762976 949939 usertrap_amd64.go:122] [ 49030: 49030] Allocate a new trap: 0xc001a6f3b0 41 D0620 03:40:55.763083 949939 usertrap_amd64.go:225] [ 49030: 49030] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:55.839307 949939 usertrap_amd64.go:212] [ 49031: 49031] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:55.839486 949939 usertrap_amd64.go:122] [ 49031: 49031] Allocate a new trap: 0xc0066f2f90 40 D0620 03:40:55.840271 949939 usertrap_amd64.go:225] [ 49031: 49031] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:55.844482 949939 usertrap_amd64.go:212] [ 49031: 49031] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:55.844601 949939 usertrap_amd64.go:122] [ 49031: 49031] Allocate a new trap: 0xc0066f2f90 41 D0620 03:40:55.844697 949939 usertrap_amd64.go:225] [ 49031: 49031] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:55.848992 949939 usertrap_amd64.go:212] [ 49030: 49030] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:55.849078 949939 usertrap_amd64.go:122] [ 49030: 49030] Allocate a new trap: 0xc001a6f3b0 42 D0620 03:40:55.849140 949939 usertrap_amd64.go:225] [ 49030: 49030] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:55.862429 949939 usertrap_amd64.go:212] [ 49032: 49032] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:55.862540 949939 usertrap_amd64.go:122] [ 49032: 49032] Allocate a new trap: 0xc01f00e6f0 40 D0620 03:40:55.863586 949939 usertrap_amd64.go:212] [ 49030: 49030] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:55.863655 949939 usertrap_amd64.go:122] [ 49030: 49030] Allocate a new trap: 0xc001a6f3b0 43 D0620 03:40:55.863747 949939 usertrap_amd64.go:225] [ 49030: 49030] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:55.864090 949939 usertrap_amd64.go:225] [ 49032: 49032] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:55.866654 949939 usertrap_amd64.go:212] [ 49030: 49030] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:55.866744 949939 usertrap_amd64.go:122] [ 49030: 49030] Allocate a new trap: 0xc001a6f3b0 44 D0620 03:40:55.866822 949939 usertrap_amd64.go:225] [ 49030: 49030] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:55.870426 949939 usertrap_amd64.go:212] [ 49031: 49031] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:55.870492 949939 usertrap_amd64.go:122] [ 49031: 49031] Allocate a new trap: 0xc0066f2f90 42 D0620 03:40:55.870596 949939 usertrap_amd64.go:225] [ 49031: 49031] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:55.872339 949939 usertrap_amd64.go:212] [ 49032: 49032] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:55.872419 949939 usertrap_amd64.go:122] [ 49032: 49032] Allocate a new trap: 0xc01f00e6f0 41 D0620 03:40:55.872481 949939 usertrap_amd64.go:225] [ 49032: 49032] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:55.872977 949939 task_exit.go:204] [ 49030: 49030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.873396 949939 task_exit.go:204] [ 49030: 49030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.873555 949939 task_signals.go:204] [ 49030: 49033] Signal 49030, PID: 49033, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.873599 949939 task_signals.go:204] [ 49030: 49035] Signal 49030, PID: 49035, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.873689 949939 task_exit.go:204] [ 49030: 49033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.873641 949939 task_signals.go:204] [ 49030: 49034] Signal 49030, PID: 49034, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:55.873841 949939 task_exit.go:204] [ 49030: 49034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.873959 949939 task_exit.go:204] [ 49030: 49035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:55.874331 949939 task_exit.go:204] [ 49030: 49035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.874396 949939 task_exit.go:204] [ 49030: 49035] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.874562 949939 task_exit.go:204] [ 49030: 49033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.874624 949939 task_exit.go:204] [ 49030: 49033] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.879556 949939 task_exit.go:204] [ 49030: 49034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:55.879807 949939 task_exit.go:204] [ 49030: 49034] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.879952 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:55.880461 949939 task_exit.go:204] [ 49030: 49030] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:55.881163 949939 usertrap_amd64.go:212] [ 49031: 49036] Found the pattern at ip 559fa90733fd:sysno 257 D0620 03:40:55.881233 949939 usertrap_amd64.go:122] [ 49031: 49036] Allocate a new trap: 0xc0066f2f90 43 D0620 03:40:55.881283 949939 usertrap_amd64.go:225] [ 49031: 49036] Apply the binary patch addr 559fa90733fd trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) 03:40:55 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f00000001c0)={r2}) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0', [{0x20, '{@%@{:}\xd6j\\-&-\'$\xb9:.!'}, {0x20, '&!'}, {0x20, '&!'}, {0x20, '}.$'}, {}], 0xa, "bad6782464e6ed048a91e159a2bf6946f5d22948a5fd1bdba62ac6c22d5e7e7691f7c4136a885d99a01947b747509df90e9acce593718fe4e827c65a81526f305207af69a5c1e685d787ff89767baf432186edfa3f826a3ef25620ee20af598bda6605ba9f6d046bce41e3e3618dc577b7e405d845c8d8c18de0d72d4886c204e725ea0fa7df451fbdbb8e9befcdcf7b51a025f7de63dc0a97d2c4100182bf99afb7bf958559e1a83f3de73442f4e51fb3fbb0633e7726c32d8417210d3c"}, 0xe8) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000380)={'syzkaller0\x00', {0x2, 0x0, @dev}}) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x240280, 0x70) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'&!'}, 0x3, 0x4) setsockopt$inet_mreqsrc(r0, 0x0, 0x1, &(0x7f0000000340)={@empty, @remote, @rand_addr=0x7}, 0xc) D0620 03:40:55.901228 949939 usertrap_amd64.go:212] [ 49032: 49032] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:55.901343 949939 usertrap_amd64.go:122] [ 49032: 49032] Allocate a new trap: 0xc01f00e6f0 42 D0620 03:40:55.901478 949939 usertrap_amd64.go:225] [ 49032: 49032] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:56.293577 949939 usertrap_amd64.go:212] [ 49014: 49014] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:56.293694 949939 usertrap_amd64.go:122] [ 49014: 49014] Allocate a new trap: 0xc002b2f200 45 D0620 03:40:56.293789 949939 usertrap_amd64.go:225] [ 49014: 49014] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:40:56.294886 949939 usertrap_amd64.go:212] [ 49037: 49037] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:56.295230 949939 usertrap_amd64.go:122] [ 49037: 49037] Allocate a new trap: 0xc0023810b0 40 D0620 03:40:56.295975 949939 usertrap_amd64.go:225] [ 49037: 49037] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:56.296145 949939 usertrap_amd64.go:212] [ 49031: 49031] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:56.296228 949939 usertrap_amd64.go:122] [ 49031: 49031] Allocate a new trap: 0xc0066f2f90 44 D0620 03:40:56.296299 949939 usertrap_amd64.go:225] [ 49031: 49031] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:56.297903 949939 usertrap_amd64.go:212] [ 49032: 49032] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:56.297995 949939 usertrap_amd64.go:122] [ 49032: 49032] Allocate a new trap: 0xc01f00e6f0 43 D0620 03:40:56.298084 949939 usertrap_amd64.go:225] [ 49032: 49032] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:56.299884 949939 usertrap_amd64.go:212] [ 49037: 49037] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:56.299951 949939 usertrap_amd64.go:122] [ 49037: 49037] Allocate a new trap: 0xc0023810b0 41 D0620 03:40:56.300076 949939 usertrap_amd64.go:225] [ 49037: 49037] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:56.301428 949939 task_exit.go:204] [ 49031: 49031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.301676 949939 task_signals.go:204] [ 49031: 49040] Signal 49031, PID: 49040, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.301720 949939 task_signals.go:204] [ 49031: 49036] Signal 49031, PID: 49036, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.301802 949939 task_exit.go:204] [ 49031: 49040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.302029 949939 task_exit.go:204] [ 49014: 49014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.302205 949939 task_signals.go:204] [ 49014: 49027] Signal 49014, PID: 49027, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.302224 949939 task_signals.go:204] [ 49014: 49028] Signal 49014, PID: 49028, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.302322 949939 task_exit.go:204] [ 49014: 49027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.302586 949939 task_exit.go:204] [ 49014: 49027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.302636 949939 task_exit.go:204] [ 49014: 49027] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.302841 949939 task_signals.go:204] [ 49014: 49020] Signal 49014, PID: 49020, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.302900 949939 task_exit.go:204] [ 49031: 49031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.302848 949939 task_signals.go:204] [ 49014: 49025] Signal 49014, PID: 49025, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.303154 949939 task_exit.go:204] [ 49014: 49020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.303334 949939 task_signals.go:204] [ 49014: 49019] Signal 49014, PID: 49019, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.303449 949939 task_signals.go:204] [ 49014: 49026] Signal 49014, PID: 49026, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.303731 949939 task_exit.go:204] [ 49014: 49014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.303895 949939 task_exit.go:204] [ 49014: 49019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.304159 949939 task_exit.go:204] [ 49031: 49036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.304337 949939 task_exit.go:204] [ 49014: 49028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.304822 949939 task_exit.go:204] [ 49014: 49025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.305152 949939 task_exit.go:204] [ 49014: 49025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.305220 949939 task_exit.go:204] [ 49014: 49025] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.305435 949939 task_exit.go:204] [ 49014: 49026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.305677 949939 task_exit.go:204] [ 49031: 49040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.305774 949939 task_exit.go:204] [ 49031: 49040] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.306251 949939 task_exit.go:204] [ 49014: 49020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.306388 949939 task_exit.go:204] [ 49014: 49020] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.306834 949939 task_exit.go:204] [ 49014: 49019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.306914 949939 task_exit.go:204] [ 49014: 49019] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.307480 949939 task_exit.go:204] [ 49014: 49028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.307753 949939 task_exit.go:204] [ 49014: 49028] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.310745 949939 task_exit.go:204] [ 49031: 49036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.310842 949939 task_exit.go:204] [ 49031: 49036] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.310955 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:56.311171 949939 task_exit.go:204] [ 49031: 49031] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:56 executing program 1: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x3a, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e22, 0x0, 'lblcr\x00', 0x12, 0x5, 0x53}, 0x2c) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x2c2540, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') (async) syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./bus\x00', 0x9842, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{}, {@default_permissions}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x3a00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x6}}], [{@permit_directio}]}}, 0x0, 0x0, &(0x7f0000000380)="434221138c2c73e46357aa570b00481f94b8a8a08b6160e6b6821b44e5bbe475c521627a2b4b7da619d53959e48eace2b0e06b94e358aad0b660590858a3760b9b0d946b49d0f4c22ef483f93e87f076c3103fd22a3076d19eff8a72753920a36bf14d04e25d92c368b0ab04ec28ac79312c4ce45acfa39c2c00c09ffb080b7a63b800b883ad4f1877995fa46cf6a1ef27e5533b3f93bc98") mount$tmpfs(0x0, &(0x7f0000000640)='./bus\x00', &(0x7f0000000680), 0x40000, &(0x7f00000006c0)={[{@huge_always}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x38]}}, {@nr_blocks}], [{@subj_user={'subj_user', 0x3d, 'blksize'}}, {@dont_hash}, {@flag='ro'}, {@euid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x33, 0x33, 0x31, 0x34, 0x30, 0x35, 0x39], 0x2d, [0x36, 0x33, 0x34], 0x2d, [0x33, 0x62, 0x39, 0x30], 0x2d, [0x34, 0x33, 0x39, 0x31], 0x2d, [0x63, 0x65, 0x36, 0x35, 0x66, 0x35, 0x61, 0x64]}}}, {@smackfsdef={'smackfsdef', 0x3d, '%-\xa7*-&$).#2#/'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cache=loose'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@audit}]}) (async) mount$9p_rdma(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x80, &(0x7f0000000540)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x1ff}}, {@timeout={'timeout', 0x3d, 0x4}}, {@timeout={'timeout', 0x3d, 0x5}}, {@common=@cache_loose}, {@timeout={'timeout', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@smackfsroot={'smackfsroot', 0x3d, 'allow_other'}}]}}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:40:56.314592 949939 task_exit.go:204] [ 49014: 49026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.314733 949939 task_exit.go:204] [ 49014: 49026] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.314859 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:56.315796 949939 task_exit.go:204] [ 49014: 49014] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5450, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/75, &(0x7f0000000080)=0x4b) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) socketpair(0x27, 0x80000, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x8, 0x400}) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:56.725733 949939 usertrap_amd64.go:212] [ 49032: 49032] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:56.731845 949939 usertrap_amd64.go:122] [ 49032: 49032] Allocate a new trap: 0xc01f00e6f0 44 D0620 03:40:56.732010 949939 usertrap_amd64.go:225] [ 49032: 49032] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:56.805899 949939 task_exit.go:204] [ 49032: 49032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.806309 949939 task_exit.go:204] [ 49032: 49032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.806298 949939 task_signals.go:204] [ 49032: 49042] Signal 49032, PID: 49042, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.806496 949939 task_signals.go:204] [ 49032: 49041] Signal 49032, PID: 49041, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.806573 949939 task_exit.go:204] [ 49032: 49042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.806772 949939 task_exit.go:204] [ 49032: 49041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.806955 949939 task_signals.go:204] [ 49032: 49038] Signal 49032, PID: 49038, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.807319 949939 task_signals.go:204] [ 49032: 49039] Signal 49032, PID: 49039, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:56.807543 949939 task_exit.go:204] [ 49032: 49042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.807626 949939 task_exit.go:204] [ 49032: 49042] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.807795 949939 task_exit.go:204] [ 49032: 49038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.808023 949939 task_exit.go:204] [ 49032: 49038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.808073 949939 task_exit.go:204] [ 49032: 49038] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.808208 949939 task_exit.go:204] [ 49032: 49041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.808283 949939 task_exit.go:204] [ 49032: 49041] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.808422 949939 task_exit.go:204] [ 49032: 49039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:56.814727 949939 task_exit.go:204] [ 49032: 49039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:56.815222 949939 task_exit.go:204] [ 49032: 49039] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:56.815489 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:56.816636 949939 task_exit.go:204] [ 49032: 49032] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:56 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x0, 0x100000001, 0x4}) (async) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x0, 0x100000001, 0x4}) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x3) statfs(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)=""/42) (async) statfs(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)=""/42) D0620 03:40:56.827460 949939 usertrap_amd64.go:212] [ 49037: 49037] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:56.827593 949939 usertrap_amd64.go:122] [ 49037: 49037] Allocate a new trap: 0xc0023810b0 42 D0620 03:40:56.827708 949939 usertrap_amd64.go:225] [ 49037: 49037] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:56.840648 949939 usertrap_amd64.go:212] [ 49044: 49044] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:56.840825 949939 usertrap_amd64.go:122] [ 49044: 49044] Allocate a new trap: 0xc0021b5530 40 D0620 03:40:56.841489 949939 usertrap_amd64.go:225] [ 49044: 49044] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:56.846134 949939 usertrap_amd64.go:212] [ 49044: 49044] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:56.846362 949939 usertrap_amd64.go:122] [ 49044: 49044] Allocate a new trap: 0xc0021b5530 41 D0620 03:40:56.846515 949939 usertrap_amd64.go:225] [ 49044: 49044] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:56.848921 949939 usertrap_amd64.go:212] [ 49046: 49046] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:56.849144 949939 usertrap_amd64.go:122] [ 49046: 49046] Allocate a new trap: 0xc003084780 40 D0620 03:40:56.849789 949939 usertrap_amd64.go:225] [ 49046: 49046] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:56.851465 949939 usertrap_amd64.go:212] [ 49043: 49043] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:56.851755 949939 usertrap_amd64.go:122] [ 49043: 49043] Allocate a new trap: 0xc009c86ea0 40 D0620 03:40:56.852378 949939 usertrap_amd64.go:225] [ 49043: 49043] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:56.855061 949939 usertrap_amd64.go:212] [ 49046: 49046] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:56.855176 949939 usertrap_amd64.go:122] [ 49046: 49046] Allocate a new trap: 0xc003084780 41 D0620 03:40:56.855459 949939 usertrap_amd64.go:225] [ 49046: 49046] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:56.858525 949939 usertrap_amd64.go:212] [ 49043: 49043] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:56.858641 949939 usertrap_amd64.go:122] [ 49043: 49043] Allocate a new trap: 0xc009c86ea0 41 D0620 03:40:56.858716 949939 usertrap_amd64.go:225] [ 49043: 49043] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:56.875536 949939 usertrap_amd64.go:212] [ 49043: 49043] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:56.875648 949939 usertrap_amd64.go:122] [ 49043: 49043] Allocate a new trap: 0xc009c86ea0 42 D0620 03:40:56.875727 949939 usertrap_amd64.go:225] [ 49043: 49043] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:56.885438 949939 usertrap_amd64.go:212] [ 49046: 49046] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:56.885593 949939 usertrap_amd64.go:122] [ 49046: 49046] Allocate a new trap: 0xc003084780 42 D0620 03:40:56.885685 949939 usertrap_amd64.go:225] [ 49046: 49046] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:56.885686 949939 usertrap_amd64.go:212] [ 49043: 49048] Found the pattern at ip 559fa90733fd:sysno 257 D0620 03:40:56.886624 949939 usertrap_amd64.go:122] [ 49043: 49048] Allocate a new trap: 0xc009c86ea0 43 D0620 03:40:56.886733 949939 usertrap_amd64.go:225] [ 49043: 49048] Apply the binary patch addr 559fa90733fd trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:56.887504 949939 usertrap_amd64.go:212] [ 49044: 49044] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:56.887680 949939 usertrap_amd64.go:122] [ 49044: 49044] Allocate a new trap: 0xc0021b5530 42 D0620 03:40:56.887805 949939 usertrap_amd64.go:225] [ 49044: 49044] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:57.318441 949939 usertrap_amd64.go:212] [ 49044: 49044] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:57.318631 949939 usertrap_amd64.go:122] [ 49044: 49044] Allocate a new trap: 0xc0021b5530 43 D0620 03:40:57.318763 949939 usertrap_amd64.go:225] [ 49044: 49044] Apply the binary patch addr 56111a657124 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:57.318732 949939 usertrap_amd64.go:212] [ 49037: 49037] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:57.318894 949939 usertrap_amd64.go:122] [ 49037: 49037] Allocate a new trap: 0xc0023810b0 43 D0620 03:40:57.319012 949939 usertrap_amd64.go:225] [ 49037: 49037] Apply the binary patch addr 55e1e036b124 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:57.707581 949939 usertrap_amd64.go:212] [ 49046: 49046] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:57.707682 949939 usertrap_amd64.go:122] [ 49046: 49046] Allocate a new trap: 0xc003084780 43 D0620 03:40:57.707688 949939 usertrap_amd64.go:212] [ 49043: 49043] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:57.707813 949939 usertrap_amd64.go:122] [ 49043: 49043] Allocate a new trap: 0xc009c86ea0 44 D0620 03:40:57.707814 949939 usertrap_amd64.go:225] [ 49046: 49046] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:57.707892 949939 usertrap_amd64.go:225] [ 49043: 49043] Apply the binary patch addr 559fa90e60aa trap addr 65dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:57.709924 949939 task_exit.go:204] [ 49037: 49037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.710209 949939 task_exit.go:204] [ 49037: 49037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.710387 949939 task_signals.go:204] [ 49037: 49045] Signal 49037, PID: 49045, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.710486 949939 task_exit.go:204] [ 49037: 49045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.710652 949939 task_exit.go:204] [ 49037: 49045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.710729 949939 task_exit.go:204] [ 49037: 49045] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.710975 949939 task_signals.go:204] [ 49037: 49053] Signal 49037, PID: 49053, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.711095 949939 task_exit.go:204] [ 49037: 49053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.712822 949939 task_exit.go:204] [ 49046: 49046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.713095 949939 task_signals.go:204] [ 49046: 49052] Signal 49046, PID: 49052, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.713154 949939 task_signals.go:204] [ 49046: 49054] Signal 49046, PID: 49054, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.713331 949939 task_exit.go:204] [ 49046: 49052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.713333 949939 task_signals.go:204] [ 49046: 49055] Signal 49046, PID: 49055, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.713439 949939 task_signals.go:204] [ 49046: 49050] Signal 49046, PID: 49050, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.713555 949939 task_exit.go:204] [ 49046: 49054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.713677 949939 task_exit.go:204] [ 49046: 49055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.713838 949939 task_exit.go:204] [ 49046: 49046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.713988 949939 task_exit.go:204] [ 49046: 49052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.714068 949939 task_exit.go:204] [ 49046: 49052] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.714239 949939 task_exit.go:204] [ 49046: 49050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.714385 949939 task_exit.go:204] [ 49044: 49044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.714557 949939 task_signals.go:204] [ 49044: 49051] Signal 49044, PID: 49051, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:57.714745 949939 task_exit.go:204] [ 49046: 49055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.714833 949939 task_exit.go:204] [ 49046: 49055] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.715032 949939 task_exit.go:204] [ 49044: 49044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.715347 949939 task_exit.go:204] [ 49046: 49050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.715422 949939 task_exit.go:204] [ 49046: 49050] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.715539 949939 task_exit.go:204] [ 49044: 49051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:57.717921 949939 task_exit.go:204] [ 49037: 49053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.718011 949939 task_exit.go:204] [ 49037: 49053] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.718108 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:57.719197 949939 task_exit.go:204] [ 49037: 49037] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:57 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, 0xffffffffffffffff, 0x80000) (async) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f00000001c0)={r2}) (async) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0', [{0x20, '{@%@{:}\xd6j\\-&-\'$\xb9:.!'}, {0x20, '&!'}, {0x20, '&!'}, {0x20, '}.$'}, {}], 0xa, "bad6782464e6ed048a91e159a2bf6946f5d22948a5fd1bdba62ac6c22d5e7e7691f7c4136a885d99a01947b747509df90e9acce593718fe4e827c65a81526f305207af69a5c1e685d787ff89767baf432186edfa3f826a3ef25620ee20af598bda6605ba9f6d046bce41e3e3618dc577b7e405d845c8d8c18de0d72d4886c204e725ea0fa7df451fbdbb8e9befcdcf7b51a025f7de63dc0a97d2c4100182bf99afb7bf958559e1a83f3de73442f4e51fb3fbb0633e7726c32d8417210d3c"}, 0xe8) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000380)={'syzkaller0\x00', {0x2, 0x0, @dev}}) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x240280, 0x70) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) lsetxattr$smack_xattr_label(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'&!'}, 0x3, 0x4) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x1, &(0x7f0000000340)={@empty, @remote, @rand_addr=0x7}, 0xc) D0620 03:40:57.721675 949939 task_exit.go:204] [ 49044: 49051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.721743 949939 task_exit.go:204] [ 49044: 49051] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.721831 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:57.722444 949939 task_exit.go:204] [ 49046: 49054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:57.722574 949939 task_exit.go:204] [ 49046: 49054] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.722713 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:57.722991 949939 task_exit.go:204] [ 49044: 49044] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:57.723560 949939 task_exit.go:204] [ 49046: 49046] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5450, 0x0) (async) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/75, &(0x7f0000000080)=0x4b) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) socketpair(0x27, 0x80000, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x8, 0x400}) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) 03:40:57 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setrlimit(0x8, &(0x7f0000000140)={0x4}) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) setrlimit(0xd, &(0x7f0000000180)={0x101, 0xfffffffffffffff7}) setrlimit(0x8, &(0x7f00000001c0)={0x80000000, 0xffffffffffff8001}) D0620 03:40:57.809131 949939 usertrap_amd64.go:212] [ 49043: 49043] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:57.809237 949939 usertrap_amd64.go:122] [ 49043: 49043] Allocate a new trap: 0xc009c86ea0 45 D0620 03:40:57.809337 949939 usertrap_amd64.go:225] [ 49043: 49043] Apply the binary patch addr 559fa9073124 trap addr 65e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 94 6 0]) D0620 03:40:58.106375 949939 task_exit.go:204] [ 49043: 49043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:58.106851 949939 task_signals.go:204] [ 49043: 49048] Signal 49043, PID: 49048, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:58.106958 949939 task_signals.go:204] [ 49043: 49047] Signal 49043, PID: 49047, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:58.106943 949939 task_exit.go:204] [ 49043: 49043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:58.107125 949939 task_signals.go:204] [ 49043: 49049] Signal 49043, PID: 49049, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:58.107249 949939 task_exit.go:204] [ 49043: 49047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:58.107480 949939 task_signals.go:204] [ 49043: 49056] Signal 49043, PID: 49056, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:58.107585 949939 task_exit.go:204] [ 49043: 49047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:58.107667 949939 task_exit.go:204] [ 49043: 49047] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:58.107891 949939 task_exit.go:204] [ 49043: 49056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:58.107999 949939 task_exit.go:204] [ 49043: 49048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:58.108137 949939 task_exit.go:204] [ 49043: 49049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:58.108459 949939 task_exit.go:204] [ 49043: 49056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:58.108546 949939 task_exit.go:204] [ 49043: 49056] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:58.108725 949939 task_exit.go:204] [ 49043: 49049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:58.108864 949939 task_exit.go:204] [ 49043: 49049] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:58.169698 949939 task_exit.go:204] [ 49043: 49048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:58.169808 949939 task_exit.go:204] [ 49043: 49048] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:58.169940 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:58.170289 949939 task_exit.go:204] [ 49043: 49043] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:58 executing program 1: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000440)={0x3a, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e22, 0x0, 'lblcr\x00', 0x12, 0x5, 0x53}, 0x2c) (async, rerun: 64) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async, rerun: 64) r1 = open(&(0x7f0000000140)='./bus\x00', 0x2c2540, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./bus\x00', 0x9842, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{}, {@default_permissions}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x3a00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x6}}], [{@permit_directio}]}}, 0x0, 0x0, &(0x7f0000000380)="434221138c2c73e46357aa570b00481f94b8a8a08b6160e6b6821b44e5bbe475c521627a2b4b7da619d53959e48eace2b0e06b94e358aad0b660590858a3760b9b0d946b49d0f4c22ef483f93e87f076c3103fd22a3076d19eff8a72753920a36bf14d04e25d92c368b0ab04ec28ac79312c4ce45acfa39c2c00c09ffb080b7a63b800b883ad4f1877995fa46cf6a1ef27e5533b3f93bc98") (async) mount$tmpfs(0x0, &(0x7f0000000640)='./bus\x00', &(0x7f0000000680), 0x40000, &(0x7f00000006c0)={[{@huge_always}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x38]}}, {@nr_blocks}], [{@subj_user={'subj_user', 0x3d, 'blksize'}}, {@dont_hash}, {@flag='ro'}, {@euid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x33, 0x33, 0x31, 0x34, 0x30, 0x35, 0x39], 0x2d, [0x36, 0x33, 0x34], 0x2d, [0x33, 0x62, 0x39, 0x30], 0x2d, [0x34, 0x33, 0x39, 0x31], 0x2d, [0x63, 0x65, 0x36, 0x35, 0x66, 0x35, 0x61, 0x64]}}}, {@smackfsdef={'smackfsdef', 0x3d, '%-\xa7*-&$).#2#/'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cache=loose'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@audit}]}) mount$9p_rdma(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x80, &(0x7f0000000540)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x1ff}}, {@timeout={'timeout', 0x3d, 0x4}}, {@timeout={'timeout', 0x3d, 0x5}}, {@common=@cache_loose}, {@timeout={'timeout', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@smackfsroot={'smackfsroot', 0x3d, 'allow_other'}}]}}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async, rerun: 32) chdir(&(0x7f0000000040)='./file0\x00') (rerun: 32) D0620 03:40:58.190213 949939 usertrap_amd64.go:212] [ 49057: 49057] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:58.190353 949939 usertrap_amd64.go:122] [ 49057: 49057] Allocate a new trap: 0xc000316a20 40 D0620 03:40:58.191087 949939 usertrap_amd64.go:212] [ 49059: 49059] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:58.191194 949939 usertrap_amd64.go:122] [ 49059: 49059] Allocate a new trap: 0xc004592150 40 D0620 03:40:58.191516 949939 usertrap_amd64.go:225] [ 49057: 49057] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:58.193337 949939 usertrap_amd64.go:225] [ 49059: 49059] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:58.197903 949939 usertrap_amd64.go:212] [ 49057: 49057] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:58.198041 949939 usertrap_amd64.go:122] [ 49057: 49057] Allocate a new trap: 0xc000316a20 41 D0620 03:40:58.198135 949939 usertrap_amd64.go:225] [ 49057: 49057] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:58.201456 949939 usertrap_amd64.go:212] [ 49058: 49058] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:58.201661 949939 usertrap_amd64.go:122] [ 49058: 49058] Allocate a new trap: 0xc009c870e0 40 D0620 03:40:58.202261 949939 usertrap_amd64.go:225] [ 49058: 49058] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:58.204886 949939 usertrap_amd64.go:212] [ 49058: 49058] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:58.205056 949939 usertrap_amd64.go:122] [ 49058: 49058] Allocate a new trap: 0xc009c870e0 41 D0620 03:40:58.205184 949939 usertrap_amd64.go:225] [ 49058: 49058] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:58.213301 949939 usertrap_amd64.go:212] [ 49059: 49059] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:58.213381 949939 usertrap_amd64.go:122] [ 49059: 49059] Allocate a new trap: 0xc004592150 41 D0620 03:40:58.213450 949939 usertrap_amd64.go:225] [ 49059: 49059] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:58.225396 949939 usertrap_amd64.go:212] [ 49058: 49058] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:58.225513 949939 usertrap_amd64.go:122] [ 49058: 49058] Allocate a new trap: 0xc009c870e0 42 D0620 03:40:58.225661 949939 usertrap_amd64.go:225] [ 49058: 49058] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:58.233291 949939 usertrap_amd64.go:212] [ 49060: 49060] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:58.233424 949939 usertrap_amd64.go:122] [ 49060: 49060] Allocate a new trap: 0xc0023812f0 40 D0620 03:40:58.233997 949939 usertrap_amd64.go:225] [ 49060: 49060] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:58.241865 949939 usertrap_amd64.go:212] [ 49060: 49060] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:58.241973 949939 usertrap_amd64.go:122] [ 49060: 49060] Allocate a new trap: 0xc0023812f0 41 D0620 03:40:58.242088 949939 usertrap_amd64.go:225] [ 49060: 49060] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:58.247716 949939 usertrap_amd64.go:212] [ 49057: 49057] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:58.247843 949939 usertrap_amd64.go:122] [ 49057: 49057] Allocate a new trap: 0xc000316a20 42 D0620 03:40:58.247962 949939 usertrap_amd64.go:225] [ 49057: 49057] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:58.255676 949939 usertrap_amd64.go:212] [ 49059: 49059] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:58.255838 949939 usertrap_amd64.go:122] [ 49059: 49059] Allocate a new trap: 0xc004592150 42 D0620 03:40:58.256046 949939 usertrap_amd64.go:225] [ 49059: 49059] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:58.350962 949939 usertrap_amd64.go:212] [ 49060: 49060] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:58.351078 949939 usertrap_amd64.go:122] [ 49060: 49060] Allocate a new trap: 0xc0023812f0 42 D0620 03:40:58.351163 949939 usertrap_amd64.go:225] [ 49060: 49060] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:58.814191 949939 usertrap_amd64.go:212] [ 49058: 49058] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:58.814308 949939 usertrap_amd64.go:122] [ 49058: 49058] Allocate a new trap: 0xc009c870e0 43 D0620 03:40:58.814404 949939 usertrap_amd64.go:225] [ 49058: 49058] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:58.822297 949939 usertrap_amd64.go:212] [ 49057: 49057] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:58.822400 949939 usertrap_amd64.go:122] [ 49057: 49057] Allocate a new trap: 0xc000316a20 43 D0620 03:40:58.822471 949939 usertrap_amd64.go:225] [ 49057: 49057] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:59.284320 949939 usertrap_amd64.go:212] [ 49059: 49059] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:59.284569 949939 usertrap_amd64.go:122] [ 49059: 49059] Allocate a new trap: 0xc004592150 43 D0620 03:40:59.288812 949939 usertrap_amd64.go:225] [ 49059: 49059] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:59.289523 949939 usertrap_amd64.go:212] [ 49057: 49057] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:59.289612 949939 usertrap_amd64.go:122] [ 49057: 49057] Allocate a new trap: 0xc000316a20 44 D0620 03:40:59.289719 949939 usertrap_amd64.go:225] [ 49057: 49057] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:59.290480 949939 usertrap_amd64.go:212] [ 49058: 49058] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:59.290639 949939 usertrap_amd64.go:122] [ 49058: 49058] Allocate a new trap: 0xc009c870e0 44 D0620 03:40:59.290770 949939 usertrap_amd64.go:225] [ 49058: 49058] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:59.291173 949939 usertrap_amd64.go:212] [ 49060: 49079] Found the pattern at ip 559fa90733fd:sysno 257 D0620 03:40:59.291395 949939 usertrap_amd64.go:122] [ 49060: 49079] Allocate a new trap: 0xc0023812f0 43 D0620 03:40:59.291565 949939 usertrap_amd64.go:212] [ 49059: 49059] Found the pattern at ip 56111a657124:sysno 3 D0620 03:40:59.291609 949939 usertrap_amd64.go:225] [ 49060: 49079] Apply the binary patch addr 559fa90733fd trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:40:59.291768 949939 usertrap_amd64.go:122] [ 49059: 49059] Allocate a new trap: 0xc004592150 44 D0620 03:40:59.291950 949939 usertrap_amd64.go:225] [ 49059: 49059] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:40:59.306625 949939 task_exit.go:204] [ 49057: 49057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.306859 949939 task_signals.go:204] [ 49057: 49073] Signal 49057, PID: 49073, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.306920 949939 task_signals.go:204] [ 49057: 49076] Signal 49057, PID: 49076, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.307147 949939 task_signals.go:204] [ 49057: 49070] Signal 49057, PID: 49070, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.307204 949939 task_signals.go:204] [ 49057: 49062] Signal 49057, PID: 49062, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.307298 949939 task_exit.go:204] [ 49057: 49073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.308299 949939 task_signals.go:204] [ 49057: 49078] Signal 49057, PID: 49078, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.308349 949939 task_signals.go:204] [ 49057: 49063] Signal 49057, PID: 49063, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.308521 949939 task_exit.go:204] [ 49057: 49070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.308863 949939 task_signals.go:204] [ 49057: 49077] Signal 49057, PID: 49077, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.309082 949939 task_exit.go:204] [ 49057: 49062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.309369 949939 usertrap_amd64.go:212] [ 49060: 49060] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:40:59.309389 949939 task_exit.go:204] [ 49057: 49057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.309436 949939 usertrap_amd64.go:122] [ 49060: 49060] Allocate a new trap: 0xc0023812f0 44 D0620 03:40:59.309554 949939 usertrap_amd64.go:225] [ 49060: 49060] Apply the binary patch addr 559fa90e60aa trap addr 65dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:40:59.309719 949939 task_exit.go:204] [ 49057: 49078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.309949 949939 task_exit.go:204] [ 49057: 49063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.310124 949939 task_signals.go:204] [ 49058: 49074] Signal 49058, PID: 49074, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.310138 949939 task_exit.go:204] [ 49057: 49076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.310397 949939 task_signals.go:204] [ 49058: 49068] Signal 49058, PID: 49068, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.310496 949939 task_signals.go:204] [ 49058: 49065] Signal 49058, PID: 49065, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.310562 949939 task_exit.go:204] [ 49057: 49077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.310659 949939 task_signals.go:204] [ 49058: 49061] Signal 49058, PID: 49061, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.310900 949939 task_exit.go:204] [ 49058: 49058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.311315 949939 task_exit.go:204] [ 49058: 49074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.311524 949939 task_exit.go:204] [ 49057: 49076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.311602 949939 task_exit.go:204] [ 49057: 49076] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.312011 949939 task_exit.go:204] [ 49058: 49065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.312254 949939 task_exit.go:204] [ 49058: 49065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.312308 949939 task_exit.go:204] [ 49058: 49065] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.312398 949939 task_exit.go:204] [ 49057: 49073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.312467 949939 task_exit.go:204] [ 49057: 49073] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.313218 949939 task_exit.go:204] [ 49058: 49068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.313326 949939 task_signals.go:204] [ 49059: 49064] Signal 49059, PID: 49064, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.313538 949939 task_exit.go:204] [ 49058: 49061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.313814 949939 task_exit.go:204] [ 49059: 49059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.314097 949939 task_signals.go:204] [ 49059: 49072] Signal 49059, PID: 49072, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.314072 949939 task_signals.go:204] [ 49059: 49071] Signal 49059, PID: 49071, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.314144 949939 task_signals.go:204] [ 49059: 49069] Signal 49059, PID: 49069, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.314312 949939 task_exit.go:204] [ 49059: 49071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.314639 949939 task_exit.go:204] [ 49059: 49071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.314723 949939 task_exit.go:204] [ 49059: 49071] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.314867 949939 task_exit.go:204] [ 49059: 49072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.315256 949939 task_exit.go:204] [ 49058: 49058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.315463 949939 task_exit.go:204] [ 49059: 49064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.316089 949939 task_exit.go:204] [ 49059: 49069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.316474 949939 task_exit.go:204] [ 49057: 49078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.316604 949939 task_exit.go:204] [ 49057: 49078] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.317113 949939 task_exit.go:204] [ 49058: 49074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.317296 949939 task_exit.go:204] [ 49058: 49074] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.318679 949939 task_exit.go:204] [ 49057: 49062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.318763 949939 task_exit.go:204] [ 49057: 49062] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.318935 949939 task_exit.go:204] [ 49057: 49070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.319032 949939 task_exit.go:204] [ 49057: 49070] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.319586 949939 task_exit.go:204] [ 49057: 49063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.319676 949939 task_exit.go:204] [ 49057: 49063] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.320057 949939 task_exit.go:204] [ 49059: 49059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.320246 949939 task_exit.go:204] [ 49059: 49072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.320324 949939 task_exit.go:204] [ 49059: 49072] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.320468 949939 task_exit.go:204] [ 49058: 49061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.320517 949939 task_exit.go:204] [ 49058: 49061] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.320649 949939 task_exit.go:204] [ 49059: 49064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.320722 949939 task_exit.go:204] [ 49059: 49064] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.322662 949939 task_exit.go:204] [ 49057: 49077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.322772 949939 task_exit.go:204] [ 49057: 49077] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.322896 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:59.323189 949939 task_exit.go:204] [ 49057: 49057] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.323939 949939 task_exit.go:204] [ 49058: 49068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.324031 949939 task_exit.go:204] [ 49058: 49068] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.324152 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:59.324751 949939 task_exit.go:204] [ 49058: 49058] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:59 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f00000001c0)={r2}) (async) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0', [{0x20, '{@%@{:}\xd6j\\-&-\'$\xb9:.!'}, {0x20, '&!'}, {0x20, '&!'}, {0x20, '}.$'}, {}], 0xa, "bad6782464e6ed048a91e159a2bf6946f5d22948a5fd1bdba62ac6c22d5e7e7691f7c4136a885d99a01947b747509df90e9acce593718fe4e827c65a81526f305207af69a5c1e685d787ff89767baf432186edfa3f826a3ef25620ee20af598bda6605ba9f6d046bce41e3e3618dc577b7e405d845c8d8c18de0d72d4886c204e725ea0fa7df451fbdbb8e9befcdcf7b51a025f7de63dc0a97d2c4100182bf99afb7bf958559e1a83f3de73442f4e51fb3fbb0633e7726c32d8417210d3c"}, 0xe8) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000380)={'syzkaller0\x00', {0x2, 0x0, @dev}}) (async) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./bus\x00', 0x240280, 0x70) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) lsetxattr$smack_xattr_label(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'&!'}, 0x3, 0x4) setsockopt$inet_mreqsrc(r0, 0x0, 0x1, &(0x7f0000000340)={@empty, @remote, @rand_addr=0x7}, 0xc) 03:40:59 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) setrlimit(0x8, &(0x7f0000000140)={0x4}) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) setrlimit(0xd, &(0x7f0000000180)={0x101, 0xfffffffffffffff7}) (async) setrlimit(0xd, &(0x7f0000000180)={0x101, 0xfffffffffffffff7}) setrlimit(0x8, &(0x7f00000001c0)={0x80000000, 0xffffffffffff8001}) D0620 03:40:59.334572 949939 task_exit.go:204] [ 49059: 49069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.334714 949939 task_exit.go:204] [ 49059: 49069] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.334938 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:40:59.334983 949939 usertrap_amd64.go:212] [ 49060: 49060] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:40:59.335076 949939 usertrap_amd64.go:122] [ 49060: 49060] Allocate a new trap: 0xc0023812f0 45 D0620 03:40:59.335146 949939 task_exit.go:204] [ 49059: 49059] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.335200 949939 usertrap_amd64.go:225] [ 49060: 49060] Apply the binary patch addr 559fa9073124 trap addr 65e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 94 6 0]) 03:40:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 32) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (rerun: 32) ioctl$TCSETAW(r2, 0x5450, 0x0) (async) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/75, &(0x7f0000000080)=0x4b) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) (async) socketpair(0x27, 0x80000, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x8, 0x400}) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) r4 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, 0x0, 0x0) D0620 03:40:59.349462 949939 task_exit.go:204] [ 49060: 49060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.349924 949939 task_exit.go:204] [ 49060: 49060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.350259 949939 task_signals.go:204] [ 49060: 49066] Signal 49060, PID: 49066, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.350456 949939 task_exit.go:204] [ 49060: 49066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.350696 949939 task_signals.go:204] [ 49060: 49079] Signal 49060, PID: 49079, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.350673 949939 task_signals.go:204] [ 49060: 49080] Signal 49060, PID: 49080, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.350810 949939 task_exit.go:204] [ 49060: 49079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.351108 949939 task_exit.go:204] [ 49060: 49079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.351181 949939 task_exit.go:204] [ 49060: 49079] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.351295 949939 task_exit.go:204] [ 49060: 49080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.351731 949939 task_signals.go:204] [ 49060: 49067] Signal 49060, PID: 49067, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.351854 949939 task_signals.go:204] [ 49060: 49075] Signal 49060, PID: 49075, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.352059 949939 task_exit.go:204] [ 49060: 49066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.352174 949939 task_exit.go:204] [ 49060: 49066] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.352321 949939 task_exit.go:204] [ 49060: 49067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.352603 949939 task_exit.go:204] [ 49060: 49067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.352668 949939 task_exit.go:204] [ 49060: 49067] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.352841 949939 task_exit.go:204] [ 49060: 49075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.353007 949939 task_exit.go:204] [ 49060: 49080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.353141 949939 task_exit.go:204] [ 49060: 49080] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.416335 949939 task_exit.go:204] [ 49060: 49075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.416425 949939 task_exit.go:204] [ 49060: 49075] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.416534 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:40:59.416980 949939 task_exit.go:204] [ 49060: 49060] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:59 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') D0620 03:40:59.436560 949939 usertrap_amd64.go:212] [ 49081: 49081] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:40:59.436692 949939 usertrap_amd64.go:122] [ 49081: 49081] Allocate a new trap: 0xc000316cf0 40 D0620 03:40:59.437323 949939 usertrap_amd64.go:225] [ 49081: 49081] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:40:59.448989 949939 usertrap_amd64.go:212] [ 49082: 49082] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:40:59.449084 949939 usertrap_amd64.go:122] [ 49082: 49082] Allocate a new trap: 0xc00945f6b0 40 D0620 03:40:59.449678 949939 usertrap_amd64.go:225] [ 49082: 49082] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:40:59.450620 949939 usertrap_amd64.go:212] [ 49083: 49083] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:40:59.450885 949939 usertrap_amd64.go:122] [ 49083: 49083] Allocate a new trap: 0xc011768090 40 D0620 03:40:59.451498 949939 usertrap_amd64.go:225] [ 49083: 49083] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:40:59.453149 949939 usertrap_amd64.go:212] [ 49082: 49082] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:40:59.453331 949939 usertrap_amd64.go:122] [ 49082: 49082] Allocate a new trap: 0xc00945f6b0 41 D0620 03:40:59.453474 949939 usertrap_amd64.go:225] [ 49082: 49082] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:40:59.454879 949939 usertrap_amd64.go:212] [ 49083: 49083] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:40:59.454959 949939 usertrap_amd64.go:122] [ 49083: 49083] Allocate a new trap: 0xc011768090 41 D0620 03:40:59.455091 949939 usertrap_amd64.go:225] [ 49083: 49083] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:40:59.460610 949939 usertrap_amd64.go:212] [ 49081: 49081] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:40:59.460706 949939 usertrap_amd64.go:122] [ 49081: 49081] Allocate a new trap: 0xc000316cf0 41 D0620 03:40:59.460800 949939 usertrap_amd64.go:225] [ 49081: 49081] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:40:59.481937 949939 usertrap_amd64.go:212] [ 49082: 49082] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:40:59.482081 949939 usertrap_amd64.go:122] [ 49082: 49082] Allocate a new trap: 0xc00945f6b0 42 D0620 03:40:59.482176 949939 usertrap_amd64.go:225] [ 49082: 49082] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:40:59.485865 949939 usertrap_amd64.go:212] [ 49081: 49081] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:40:59.485971 949939 usertrap_amd64.go:122] [ 49081: 49081] Allocate a new trap: 0xc000316cf0 42 D0620 03:40:59.486099 949939 usertrap_amd64.go:225] [ 49081: 49081] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:40:59.488236 949939 usertrap_amd64.go:212] [ 49084: 49084] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:40:59.488383 949939 usertrap_amd64.go:122] [ 49084: 49084] Allocate a new trap: 0xc001a6f770 40 D0620 03:40:59.488923 949939 usertrap_amd64.go:225] [ 49084: 49084] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:40:59.500279 949939 usertrap_amd64.go:212] [ 49084: 49084] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:40:59.500372 949939 usertrap_amd64.go:122] [ 49084: 49084] Allocate a new trap: 0xc001a6f770 41 D0620 03:40:59.500492 949939 usertrap_amd64.go:225] [ 49084: 49084] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:40:59.582084 949939 usertrap_amd64.go:212] [ 49083: 49083] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:40:59.582214 949939 usertrap_amd64.go:122] [ 49083: 49083] Allocate a new trap: 0xc011768090 42 D0620 03:40:59.582343 949939 usertrap_amd64.go:225] [ 49083: 49083] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:40:59.591170 949939 usertrap_amd64.go:212] [ 49082: 49082] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:40:59.591299 949939 usertrap_amd64.go:122] [ 49082: 49082] Allocate a new trap: 0xc00945f6b0 43 D0620 03:40:59.591381 949939 usertrap_amd64.go:225] [ 49082: 49082] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:40:59.638477 949939 usertrap_amd64.go:212] [ 49081: 49081] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:40:59.638843 949939 usertrap_amd64.go:122] [ 49081: 49081] Allocate a new trap: 0xc000316cf0 43 D0620 03:40:59.639402 949939 usertrap_amd64.go:225] [ 49081: 49081] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:40:59.774805 949939 usertrap_amd64.go:212] [ 49083: 49083] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:40:59.774923 949939 usertrap_amd64.go:122] [ 49083: 49083] Allocate a new trap: 0xc011768090 43 D0620 03:40:59.774994 949939 usertrap_amd64.go:225] [ 49083: 49083] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:40:59.955935 949939 usertrap_amd64.go:212] [ 49082: 49082] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:40:59.956030 949939 usertrap_amd64.go:122] [ 49082: 49082] Allocate a new trap: 0xc00945f6b0 44 D0620 03:40:59.956165 949939 usertrap_amd64.go:225] [ 49082: 49082] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:40:59.956456 949939 usertrap_amd64.go:212] [ 49083: 49083] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:40:59.956536 949939 usertrap_amd64.go:122] [ 49083: 49083] Allocate a new trap: 0xc011768090 44 D0620 03:40:59.956687 949939 usertrap_amd64.go:225] [ 49083: 49083] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:40:59.966069 949939 task_exit.go:204] [ 49083: 49083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.966324 949939 task_signals.go:204] [ 49083: 49097] Signal 49083, PID: 49097, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.966415 949939 task_exit.go:204] [ 49083: 49097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.966655 949939 task_exit.go:204] [ 49083: 49097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.966704 949939 task_exit.go:204] [ 49083: 49097] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.966592 949939 task_signals.go:204] [ 49083: 49092] Signal 49083, PID: 49092, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.966891 949939 task_signals.go:204] [ 49083: 49099] Signal 49083, PID: 49099, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.967047 949939 task_signals.go:204] [ 49083: 49096] Signal 49083, PID: 49096, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.967003 949939 task_signals.go:204] [ 49083: 49095] Signal 49083, PID: 49095, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.967112 949939 task_exit.go:204] [ 49083: 49099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.967237 949939 task_signals.go:204] [ 49083: 49098] Signal 49083, PID: 49098, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.967361 949939 task_exit.go:204] [ 49083: 49099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.967390 949939 task_exit.go:204] [ 49083: 49099] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.967635 949939 task_exit.go:204] [ 49083: 49092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.967817 949939 task_exit.go:204] [ 49083: 49092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.967901 949939 task_exit.go:204] [ 49083: 49092] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.967865 949939 usertrap_amd64.go:212] [ 49084: 49084] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:40:59.968051 949939 usertrap_amd64.go:122] [ 49084: 49084] Allocate a new trap: 0xc001a6f770 42 D0620 03:40:59.968173 949939 usertrap_amd64.go:225] [ 49084: 49084] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:40:59.968079 949939 task_exit.go:204] [ 49083: 49083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.968567 949939 task_exit.go:204] [ 49083: 49095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.968681 949939 task_exit.go:204] [ 49082: 49082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.969025 949939 task_signals.go:204] [ 49082: 49093] Signal 49082, PID: 49093, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.969071 949939 task_signals.go:204] [ 49082: 49088] Signal 49082, PID: 49088, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.969156 949939 task_exit.go:204] [ 49083: 49098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.969334 949939 task_signals.go:204] [ 49082: 49091] Signal 49082, PID: 49091, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.969369 949939 task_signals.go:204] [ 49082: 49085] Signal 49082, PID: 49085, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.969525 949939 task_signals.go:204] [ 49082: 49094] Signal 49082, PID: 49094, TID: 0, fault addr: 0x9: terminating thread group D0620 03:40:59.969632 949939 task_exit.go:204] [ 49083: 49096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.969924 949939 task_exit.go:204] [ 49083: 49096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.969993 949939 task_exit.go:204] [ 49083: 49096] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.970104 949939 task_exit.go:204] [ 49082: 49093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.970286 949939 task_exit.go:204] [ 49082: 49093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.970337 949939 task_exit.go:204] [ 49082: 49093] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.970443 949939 task_exit.go:204] [ 49082: 49088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.970550 949939 task_exit.go:204] [ 49082: 49082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.970787 949939 task_exit.go:204] [ 49082: 49088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.970850 949939 task_exit.go:204] [ 49082: 49088] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.971009 949939 task_exit.go:204] [ 49082: 49085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.971151 949939 task_exit.go:204] [ 49082: 49094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.972089 949939 task_exit.go:204] [ 49082: 49091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:40:59.972509 949939 task_exit.go:204] [ 49082: 49091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.972683 949939 task_exit.go:204] [ 49082: 49091] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.973377 949939 task_exit.go:204] [ 49083: 49095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.973470 949939 task_exit.go:204] [ 49083: 49095] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.973900 949939 task_exit.go:204] [ 49082: 49085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.974027 949939 task_exit.go:204] [ 49082: 49085] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.982950 949939 task_exit.go:204] [ 49083: 49098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.983053 949939 task_exit.go:204] [ 49083: 49098] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.983160 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:40:59.983331 949939 task_exit.go:204] [ 49083: 49083] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.983825 949939 task_exit.go:204] [ 49082: 49094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:40:59.983921 949939 task_exit.go:204] [ 49082: 49094] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:40:59.984044 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:40:59.985744 949939 task_exit.go:204] [ 49082: 49082] Transitioning from exit state TaskExitZombie to TaskExitDead 03:40:59 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setrlimit(0x8, &(0x7f0000000140)={0x4}) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) setrlimit(0xd, &(0x7f0000000180)={0x101, 0xfffffffffffffff7}) (async) setrlimit(0x8, &(0x7f00000001c0)={0x80000000, 0xffffffffffff8001}) 03:40:59 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) getpeername$unix(r1, &(0x7f0000000140), &(0x7f00000000c0)=0x6e) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:00.100306 949939 usertrap_amd64.go:212] [ 49102: 49102] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:00.100471 949939 usertrap_amd64.go:122] [ 49102: 49102] Allocate a new trap: 0xc0003172f0 40 D0620 03:41:00.103968 949939 usertrap_amd64.go:225] [ 49102: 49102] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:00.108972 949939 usertrap_amd64.go:212] [ 49102: 49102] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:00.109150 949939 usertrap_amd64.go:122] [ 49102: 49102] Allocate a new trap: 0xc0003172f0 41 D0620 03:41:00.109325 949939 usertrap_amd64.go:225] [ 49102: 49102] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:00.174853 949939 usertrap_amd64.go:212] [ 49084: 49084] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:00.175084 949939 usertrap_amd64.go:122] [ 49084: 49084] Allocate a new trap: 0xc001a6f770 43 D0620 03:41:00.175199 949939 usertrap_amd64.go:225] [ 49084: 49084] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:00.309943 949939 usertrap_amd64.go:212] [ 49081: 49081] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:00.310057 949939 usertrap_amd64.go:122] [ 49081: 49081] Allocate a new trap: 0xc000316cf0 44 D0620 03:41:00.310181 949939 usertrap_amd64.go:225] [ 49081: 49081] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:00.415889 949939 usertrap_amd64.go:212] [ 49084: 49084] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:00.415971 949939 usertrap_amd64.go:122] [ 49084: 49084] Allocate a new trap: 0xc001a6f770 44 D0620 03:41:00.416063 949939 usertrap_amd64.go:225] [ 49084: 49084] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:00.420041 949939 usertrap_amd64.go:212] [ 49103: 49103] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:00.420160 949939 usertrap_amd64.go:122] [ 49103: 49103] Allocate a new trap: 0xc009a01bf0 40 D0620 03:41:00.421629 949939 usertrap_amd64.go:225] [ 49103: 49103] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:00.428006 949939 task_exit.go:204] [ 49081: 49081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.428391 949939 task_signals.go:204] [ 49081: 49086] Signal 49081, PID: 49086, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.428702 949939 task_signals.go:204] [ 49081: 49087] Signal 49081, PID: 49087, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.428613 949939 task_signals.go:204] [ 49081: 49090] Signal 49081, PID: 49090, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.428373 949939 task_signals.go:204] [ 49081: 49089] Signal 49081, PID: 49089, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.428809 949939 task_exit.go:204] [ 49081: 49081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.429073 949939 task_exit.go:204] [ 49081: 49086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.429338 949939 task_exit.go:204] [ 49081: 49086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.429420 949939 task_exit.go:204] [ 49081: 49086] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.430078 949939 task_exit.go:204] [ 49081: 49087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.430430 949939 task_exit.go:204] [ 49081: 49087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.430508 949939 task_exit.go:204] [ 49081: 49087] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.430616 949939 task_exit.go:204] [ 49081: 49090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.430798 949939 task_exit.go:204] [ 49081: 49090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.430853 949939 task_exit.go:204] [ 49081: 49090] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.430953 949939 task_exit.go:204] [ 49081: 49089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.438846 949939 usertrap_amd64.go:212] [ 49103: 49103] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:00.438936 949939 usertrap_amd64.go:122] [ 49103: 49103] Allocate a new trap: 0xc009a01bf0 41 D0620 03:41:00.439020 949939 usertrap_amd64.go:225] [ 49103: 49103] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:00.438934 949939 task_exit.go:204] [ 49081: 49089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.439161 949939 task_exit.go:204] [ 49081: 49089] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.439322 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:00.439622 949939 task_exit.go:204] [ 49081: 49081] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r3, 0x5450, 0x0) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:00.444902 949939 task_exit.go:204] [ 49084: 49084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.445349 949939 task_exit.go:204] [ 49084: 49084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.445541 949939 task_signals.go:204] [ 49084: 49101] Signal 49084, PID: 49101, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.445503 949939 task_signals.go:204] [ 49084: 49100] Signal 49084, PID: 49100, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.445653 949939 task_exit.go:204] [ 49084: 49101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.445615 949939 task_signals.go:204] [ 49084: 49104] Signal 49084, PID: 49104, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.445846 949939 task_exit.go:204] [ 49084: 49104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.446235 949939 task_exit.go:204] [ 49084: 49104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.446300 949939 task_exit.go:204] [ 49084: 49104] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.446477 949939 task_exit.go:204] [ 49084: 49100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.446838 949939 task_exit.go:204] [ 49084: 49101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.446971 949939 task_exit.go:204] [ 49084: 49101] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.452419 949939 task_exit.go:204] [ 49084: 49100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.452475 949939 task_exit.go:204] [ 49084: 49100] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.452604 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:00.452891 949939 task_exit.go:204] [ 49084: 49084] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:00 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') D0620 03:41:00.529155 949939 usertrap_amd64.go:212] [ 49102: 49102] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:00.529241 949939 usertrap_amd64.go:122] [ 49102: 49102] Allocate a new trap: 0xc0003172f0 42 D0620 03:41:00.529308 949939 usertrap_amd64.go:225] [ 49102: 49102] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:00.531038 949939 usertrap_amd64.go:212] [ 49105: 49105] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:00.531133 949939 usertrap_amd64.go:122] [ 49105: 49105] Allocate a new trap: 0xc0066f3260 40 D0620 03:41:00.531679 949939 usertrap_amd64.go:225] [ 49105: 49105] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:00.536138 949939 usertrap_amd64.go:212] [ 49103: 49103] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:00.536238 949939 usertrap_amd64.go:122] [ 49103: 49103] Allocate a new trap: 0xc009a01bf0 42 D0620 03:41:00.536740 949939 usertrap_amd64.go:225] [ 49103: 49103] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:00.540340 949939 usertrap_amd64.go:212] [ 49105: 49105] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:00.540468 949939 usertrap_amd64.go:122] [ 49105: 49105] Allocate a new trap: 0xc0066f3260 41 D0620 03:41:00.540574 949939 usertrap_amd64.go:225] [ 49105: 49105] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:00.543468 949939 task_signals.go:470] [ 49103: 49109] Notified of signal 25 D0620 03:41:00.543843 949939 task_signals.go:204] [ 49103: 49109] Signal 49103, PID: 49109, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:00.543998 949939 task_exit.go:204] [ 49103: 49109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.544378 949939 task_exit.go:204] [ 49103: 49109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.544466 949939 task_exit.go:204] [ 49103: 49109] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:00.544657 949939 task_signals.go:204] [ 49103: 49103] Signal 49103, PID: 49103, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.544754 949939 task_exit.go:204] [ 49103: 49103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.549109 949939 task_exit.go:204] [ 49103: 49103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:00.549238 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:00.549491 949939 task_exit.go:204] [ 49103: 49103] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:00 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) getpeername$unix(r1, &(0x7f0000000140), &(0x7f00000000c0)=0x6e) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:00.554323 949939 usertrap_amd64.go:212] [ 49106: 49106] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:00.554442 949939 usertrap_amd64.go:122] [ 49106: 49106] Allocate a new trap: 0xc001a6f8f0 40 D0620 03:41:00.555020 949939 usertrap_amd64.go:225] [ 49106: 49106] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:00.561898 949939 usertrap_amd64.go:212] [ 49106: 49106] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:00.561990 949939 usertrap_amd64.go:122] [ 49106: 49106] Allocate a new trap: 0xc001a6f8f0 41 D0620 03:41:00.562067 949939 usertrap_amd64.go:225] [ 49106: 49106] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:00.567443 949939 usertrap_amd64.go:212] [ 49105: 49105] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:00.567536 949939 usertrap_amd64.go:122] [ 49105: 49105] Allocate a new trap: 0xc0066f3260 42 D0620 03:41:00.567672 949939 usertrap_amd64.go:225] [ 49105: 49105] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:00.597676 949939 usertrap_amd64.go:212] [ 49106: 49106] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:00.597812 949939 usertrap_amd64.go:122] [ 49106: 49106] Allocate a new trap: 0xc001a6f8f0 42 D0620 03:41:00.598717 949939 usertrap_amd64.go:225] [ 49106: 49106] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:00.602076 949939 usertrap_amd64.go:212] [ 49111: 49111] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:00.602204 949939 usertrap_amd64.go:122] [ 49111: 49111] Allocate a new trap: 0xc001a6f920 40 D0620 03:41:00.602794 949939 usertrap_amd64.go:225] [ 49111: 49111] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:00.605057 949939 usertrap_amd64.go:212] [ 49102: 49102] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:00.605163 949939 usertrap_amd64.go:122] [ 49102: 49102] Allocate a new trap: 0xc0003172f0 43 D0620 03:41:00.605243 949939 usertrap_amd64.go:225] [ 49102: 49102] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:00.606959 949939 usertrap_amd64.go:212] [ 49105: 49105] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:00.607025 949939 usertrap_amd64.go:122] [ 49105: 49105] Allocate a new trap: 0xc0066f3260 43 D0620 03:41:00.607119 949939 usertrap_amd64.go:225] [ 49105: 49105] Apply the binary patch addr 56111a657124 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:00.608211 949939 usertrap_amd64.go:212] [ 49111: 49111] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:00.608268 949939 usertrap_amd64.go:122] [ 49111: 49111] Allocate a new trap: 0xc001a6f920 41 D0620 03:41:00.608361 949939 usertrap_amd64.go:225] [ 49111: 49111] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:00.787904 949939 usertrap_amd64.go:212] [ 49106: 49106] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:00.788030 949939 usertrap_amd64.go:122] [ 49106: 49106] Allocate a new trap: 0xc001a6f8f0 43 D0620 03:41:00.788100 949939 usertrap_amd64.go:225] [ 49106: 49106] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:00.997311 949939 usertrap_amd64.go:212] [ 49106: 49106] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:00.997435 949939 usertrap_amd64.go:122] [ 49106: 49106] Allocate a new trap: 0xc001a6f8f0 44 D0620 03:41:00.997505 949939 usertrap_amd64.go:225] [ 49106: 49106] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:00.998371 949939 task_exit.go:204] [ 49105: 49105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.998603 949939 task_signals.go:204] [ 49105: 49110] Signal 49105, PID: 49110, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:00.998804 949939 task_exit.go:204] [ 49105: 49110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:00.999046 949939 task_exit.go:204] [ 49105: 49105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.004918 949939 task_exit.go:204] [ 49105: 49110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.005093 949939 task_exit.go:204] [ 49105: 49110] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.005240 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:01.005598 949939 task_exit.go:204] [ 49105: 49105] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.006912 949939 task_exit.go:204] [ 49106: 49106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.006931 949939 usertrap_amd64.go:212] [ 49102: 49102] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:01.007051 949939 usertrap_amd64.go:122] [ 49102: 49102] Allocate a new trap: 0xc0003172f0 44 D0620 03:41:01.007117 949939 task_signals.go:204] [ 49106: 49117] Signal 49106, PID: 49117, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.007160 949939 usertrap_amd64.go:225] [ 49102: 49102] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:01.007124 949939 task_signals.go:204] [ 49106: 49114] Signal 49106, PID: 49114, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.007135 949939 task_signals.go:204] [ 49106: 49116] Signal 49106, PID: 49116, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.007173 949939 task_signals.go:204] [ 49106: 49115] Signal 49106, PID: 49115, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.007242 949939 task_exit.go:204] [ 49106: 49117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.007369 949939 task_exit.go:204] [ 49106: 49114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.007604 949939 task_exit.go:204] [ 49106: 49115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.007929 949939 task_exit.go:204] [ 49106: 49106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.008274 949939 task_exit.go:204] [ 49106: 49114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.008350 949939 task_exit.go:204] [ 49106: 49114] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.008663 949939 task_exit.go:204] [ 49106: 49116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.008974 949939 task_exit.go:204] [ 49106: 49115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.009101 949939 task_exit.go:204] [ 49106: 49115] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.009273 949939 task_exit.go:204] [ 49106: 49117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.009329 949939 task_exit.go:204] [ 49106: 49117] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x0) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r3, 0x5450, 0x0) (async) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:01.014628 949939 task_exit.go:204] [ 49102: 49102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.014901 949939 task_signals.go:204] [ 49102: 49107] Signal 49102, PID: 49107, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.014952 949939 task_signals.go:204] [ 49102: 49112] Signal 49102, PID: 49112, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.015063 949939 task_signals.go:204] [ 49102: 49113] Signal 49102, PID: 49113, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.015104 949939 task_signals.go:204] [ 49102: 49108] Signal 49102, PID: 49108, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.015220 949939 task_exit.go:204] [ 49106: 49116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.015273 949939 task_exit.go:204] [ 49106: 49116] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.015372 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:01.015653 949939 task_exit.go:204] [ 49106: 49106] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.015907 949939 task_exit.go:204] [ 49102: 49107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.016056 949939 task_exit.go:204] [ 49102: 49112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.016254 949939 task_exit.go:204] [ 49102: 49113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.016397 949939 task_exit.go:204] [ 49102: 49108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.016639 949939 task_exit.go:204] [ 49102: 49102] Transitioning from exit state TaskExitInitiated to TaskExitZombie 03:41:01 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async, rerun: 32) chdir(&(0x7f00000000c0)='./file0\x00') (rerun: 32) D0620 03:41:01.016886 949939 task_exit.go:204] [ 49102: 49108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.016979 949939 task_exit.go:204] [ 49102: 49108] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.017088 949939 task_exit.go:204] [ 49102: 49112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.017212 949939 task_exit.go:204] [ 49102: 49112] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.017622 949939 task_exit.go:204] [ 49102: 49107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.017693 949939 task_exit.go:204] [ 49102: 49107] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.018599 949939 usertrap_amd64.go:212] [ 49111: 49111] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:01.018694 949939 usertrap_amd64.go:122] [ 49111: 49111] Allocate a new trap: 0xc001a6f920 42 D0620 03:41:01.018772 949939 usertrap_amd64.go:225] [ 49111: 49111] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:01.023900 949939 task_signals.go:470] [ 49111: 49118] Notified of signal 25 D0620 03:41:01.024039 949939 task_signals.go:204] [ 49111: 49118] Signal 49111, PID: 49118, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:01.024159 949939 task_exit.go:204] [ 49111: 49118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.024421 949939 task_signals.go:204] [ 49111: 49111] Signal 49111, PID: 49111, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.024656 949939 task_exit.go:204] [ 49111: 49118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.024704 949939 task_exit.go:204] [ 49111: 49118] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.025186 949939 task_exit.go:204] [ 49102: 49113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.025244 949939 task_exit.go:204] [ 49102: 49113] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.025360 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:01.025517 949939 task_exit.go:204] [ 49102: 49102] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.025889 949939 task_exit.go:204] [ 49111: 49111] Transitioning from exit state TaskExitNone to TaskExitInitiated 03:41:01 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x545180, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) utime(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)={0x401, 0x6f}) fallocate(r0, 0x79, 0x10000000000, 0x3f) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000140)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0xfffffffffffffff6, 0x2) D0620 03:41:01.031074 949939 task_exit.go:204] [ 49111: 49111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.031189 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:01.031424 949939 task_exit.go:204] [ 49111: 49111] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:01 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5450, 0x0) getpeername$unix(r1, &(0x7f0000000140), &(0x7f00000000c0)=0x6e) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:01.099484 949939 usertrap_amd64.go:212] [ 49119: 49119] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:01.099744 949939 usertrap_amd64.go:122] [ 49119: 49119] Allocate a new trap: 0xc0045925a0 40 D0620 03:41:01.106678 949939 usertrap_amd64.go:225] [ 49119: 49119] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:01.110180 949939 usertrap_amd64.go:212] [ 49119: 49119] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:01.110304 949939 usertrap_amd64.go:122] [ 49119: 49119] Allocate a new trap: 0xc0045925a0 41 D0620 03:41:01.110419 949939 usertrap_amd64.go:225] [ 49119: 49119] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:01.117360 949939 usertrap_amd64.go:212] [ 49120: 49120] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:01.117678 949939 usertrap_amd64.go:122] [ 49120: 49120] Allocate a new trap: 0xc002381620 40 D0620 03:41:01.118630 949939 usertrap_amd64.go:225] [ 49120: 49120] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:01.124589 949939 usertrap_amd64.go:212] [ 49120: 49120] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:01.124687 949939 usertrap_amd64.go:122] [ 49120: 49120] Allocate a new trap: 0xc002381620 41 D0620 03:41:01.124764 949939 usertrap_amd64.go:225] [ 49120: 49120] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:01.130945 949939 usertrap_amd64.go:212] [ 49121: 49121] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:01.131234 949939 usertrap_amd64.go:122] [ 49121: 49121] Allocate a new trap: 0xc009c87a40 40 D0620 03:41:01.132663 949939 usertrap_amd64.go:212] [ 49122: 49122] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:01.132881 949939 usertrap_amd64.go:122] [ 49122: 49122] Allocate a new trap: 0xc0045925d0 40 D0620 03:41:01.133527 949939 usertrap_amd64.go:225] [ 49122: 49122] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:01.132980 949939 usertrap_amd64.go:225] [ 49121: 49121] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:01.135033 949939 usertrap_amd64.go:212] [ 49119: 49119] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:01.135130 949939 usertrap_amd64.go:122] [ 49119: 49119] Allocate a new trap: 0xc0045925a0 42 D0620 03:41:01.135290 949939 usertrap_amd64.go:225] [ 49119: 49119] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:01.145876 949939 usertrap_amd64.go:212] [ 49122: 49122] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:01.146038 949939 usertrap_amd64.go:122] [ 49122: 49122] Allocate a new trap: 0xc0045925d0 41 D0620 03:41:01.146166 949939 usertrap_amd64.go:225] [ 49122: 49122] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:01.147066 949939 usertrap_amd64.go:212] [ 49121: 49121] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:01.147138 949939 usertrap_amd64.go:122] [ 49121: 49121] Allocate a new trap: 0xc009c87a40 41 D0620 03:41:01.147214 949939 usertrap_amd64.go:225] [ 49121: 49121] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:01.175838 949939 usertrap_amd64.go:212] [ 49119: 49119] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:01.175958 949939 usertrap_amd64.go:122] [ 49119: 49119] Allocate a new trap: 0xc0045925a0 43 D0620 03:41:01.176045 949939 usertrap_amd64.go:225] [ 49119: 49119] Apply the binary patch addr 56111a657124 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:01.177017 949939 usertrap_amd64.go:212] [ 49120: 49120] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:01.177118 949939 usertrap_amd64.go:122] [ 49120: 49120] Allocate a new trap: 0xc002381620 42 D0620 03:41:01.177203 949939 usertrap_amd64.go:225] [ 49120: 49120] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:01.177480 949939 usertrap_amd64.go:212] [ 49122: 49122] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:01.177576 949939 usertrap_amd64.go:122] [ 49122: 49122] Allocate a new trap: 0xc0045925d0 42 D0620 03:41:01.177653 949939 usertrap_amd64.go:225] [ 49122: 49122] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:01.190672 949939 usertrap_amd64.go:212] [ 49121: 49121] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:01.190791 949939 usertrap_amd64.go:122] [ 49121: 49121] Allocate a new trap: 0xc009c87a40 42 D0620 03:41:01.190901 949939 usertrap_amd64.go:225] [ 49121: 49121] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:01.195828 949939 task_exit.go:204] [ 49119: 49119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.196108 949939 task_signals.go:204] [ 49119: 49123] Signal 49119, PID: 49123, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.196163 949939 task_signals.go:204] [ 49119: 49125] Signal 49119, PID: 49125, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.196126 949939 task_signals.go:204] [ 49119: 49124] Signal 49119, PID: 49124, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.196222 949939 task_exit.go:204] [ 49119: 49119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.196276 949939 task_exit.go:204] [ 49119: 49124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.196503 949939 task_exit.go:204] [ 49119: 49124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.196566 949939 task_exit.go:204] [ 49119: 49124] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.196993 949939 task_exit.go:204] [ 49119: 49125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.197190 949939 task_exit.go:204] [ 49119: 49125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.197234 949939 task_exit.go:204] [ 49119: 49125] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.197470 949939 usertrap_amd64.go:212] [ 49122: 49122] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:01.198147 949939 usertrap_amd64.go:122] [ 49122: 49122] Allocate a new trap: 0xc0045925d0 43 D0620 03:41:01.198290 949939 usertrap_amd64.go:225] [ 49122: 49122] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:01.198131 949939 task_exit.go:204] [ 49119: 49123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.203649 949939 task_signals.go:470] [ 49121: 49129] Notified of signal 25 D0620 03:41:01.203794 949939 task_signals.go:204] [ 49121: 49129] Signal 49121, PID: 49129, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:01.203880 949939 task_exit.go:204] [ 49121: 49129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.204040 949939 task_exit.go:204] [ 49121: 49129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.204109 949939 task_exit.go:204] [ 49121: 49129] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.204282 949939 task_signals.go:204] [ 49121: 49121] Signal 49121, PID: 49121, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.204371 949939 task_exit.go:204] [ 49121: 49121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.212909 949939 task_exit.go:204] [ 49121: 49121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.213913 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:01.214360 949939 task_signals.go:204] [ 49122: 49127] Signal 49122, PID: 49127, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.214560 949939 task_exit.go:204] [ 49122: 49122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.215049 949939 task_exit.go:204] [ 49121: 49121] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.215322 949939 task_exit.go:204] [ 49122: 49127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.215618 949939 task_exit.go:204] [ 49122: 49127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.215697 949939 task_exit.go:204] [ 49122: 49127] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.217107 949939 task_exit.go:204] [ 49119: 49123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.217299 949939 task_exit.go:204] [ 49119: 49123] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.217445 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:01.220151 949939 task_exit.go:204] [ 49119: 49119] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r3, 0x5450, 0x0) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:01.225477 949939 task_exit.go:204] [ 49122: 49122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.225620 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:01.226901 949939 task_exit.go:204] [ 49122: 49122] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:01 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x545180, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) utime(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)={0x401, 0x6f}) (async) fallocate(r0, 0x79, 0x10000000000, 0x3f) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000140)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0xfffffffffffffff6, 0x2) D0620 03:41:01.232891 949939 task_signals.go:470] [ 7: 4697] Notified of signal 23 D0620 03:41:01.233441 949939 task_signals.go:220] [ 7: 4697] Signal 23: delivering to handler 03:41:01 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init() ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f00000013c0)) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x48}, {0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0x24}, {}, {0xffffffffffffffff, 0x2100}, {r2, 0x2}, {}], 0x7, 0x7fffffff) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) r4 = syz_mount_image$fuse(&(0x7f0000001140), &(0x7f0000001180)='./file0/file1\x00', 0x1000, &(0x7f00000011c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}], [{@smackfsdef={'smackfsdef', 0x3d, '$'}}, {@subj_user={'subj_user', 0x3d, '\x00'}}]}}, 0x1, 0x0, &(0x7f0000001280)="f25aa824c7b3459fa291bb3f9159f283d2727382ed2c75e283facf8839805b5e818ddcad2a33a54e098e84761ee155594f01b592629bb3ee0d5d39897f0ab1d426c76358914846244645b427daf21a5f9c2f24580fe1239a8d967512ed80664168b12b192a9d2e2c00bcd22c86a36c50659515e39f2ae9f2de9ce91e36ab2b95c06cc498d6d0c682b7bd2b86b062f34472289548fb73b60c851f1532dec0e6e42c6fbb7703756d38291184c5b2219edf282edd8d78947e20f37c84ac382b2e20a68b358cd49ade3c46277c87293bce74086cafeb385086497e09bbd7828a6dd2e79c80") ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001380)={0x0, r4, 0x6, 0x4, 0xfff, 0xffff}) r5 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r5, 0x5450) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r7 = socket$inet6(0xa, 0x4, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r8, 0x5450, 0x0) inotify_add_watch(r8, &(0x7f0000001400)='./file0\x00', 0x24000000) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r7, 0xc400941d, &(0x7f0000000580)={r6, 0x8000, 0x3, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000140)={r6, "0446b30dda9e426739df16b5698d8732"}) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:01.256051 949939 usertrap_amd64.go:212] [ 49120: 49120] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:01.256130 949939 usertrap_amd64.go:122] [ 49120: 49120] Allocate a new trap: 0xc002381620 43 D0620 03:41:01.256225 949939 usertrap_amd64.go:225] [ 49120: 49120] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:01.262195 949939 usertrap_amd64.go:212] [ 49130: 49130] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:01.262329 949939 usertrap_amd64.go:122] [ 49130: 49130] Allocate a new trap: 0xc004592720 40 D0620 03:41:01.262975 949939 usertrap_amd64.go:225] [ 49130: 49130] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:01.268085 949939 usertrap_amd64.go:212] [ 49132: 49132] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:01.268242 949939 usertrap_amd64.go:122] [ 49132: 49132] Allocate a new trap: 0xc002381830 40 D0620 03:41:01.268555 949939 usertrap_amd64.go:212] [ 49130: 49130] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:01.268645 949939 usertrap_amd64.go:122] [ 49130: 49130] Allocate a new trap: 0xc004592720 41 D0620 03:41:01.268726 949939 usertrap_amd64.go:225] [ 49130: 49130] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:01.269876 949939 usertrap_amd64.go:225] [ 49132: 49132] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:01.277441 949939 usertrap_amd64.go:212] [ 49132: 49132] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:01.277656 949939 usertrap_amd64.go:122] [ 49132: 49132] Allocate a new trap: 0xc002381830 41 D0620 03:41:01.277770 949939 usertrap_amd64.go:225] [ 49132: 49132] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:01.542474 949939 usertrap_amd64.go:212] [ 49133: 49133] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:01.542678 949939 usertrap_amd64.go:122] [ 49133: 49133] Allocate a new trap: 0xc002381800 40 D0620 03:41:01.543516 949939 usertrap_amd64.go:225] [ 49133: 49133] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:01.549608 949939 usertrap_amd64.go:212] [ 49133: 49133] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:01.549711 949939 usertrap_amd64.go:122] [ 49133: 49133] Allocate a new trap: 0xc002381800 41 D0620 03:41:01.549828 949939 usertrap_amd64.go:225] [ 49133: 49133] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:01.550926 949939 usertrap_amd64.go:212] [ 49120: 49120] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:01.551074 949939 usertrap_amd64.go:122] [ 49120: 49120] Allocate a new trap: 0xc002381620 44 D0620 03:41:01.551177 949939 usertrap_amd64.go:225] [ 49120: 49120] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:01.560276 949939 task_exit.go:204] [ 49120: 49120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.561005 949939 task_exit.go:204] [ 49120: 49120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.561764 949939 task_signals.go:204] [ 49120: 49126] Signal 49120, PID: 49126, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.562654 949939 task_exit.go:204] [ 49120: 49126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.562143 949939 task_signals.go:204] [ 49120: 49128] Signal 49120, PID: 49128, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.563020 949939 usertrap_amd64.go:212] [ 49132: 49132] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:01.563005 949939 task_exit.go:204] [ 49120: 49128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.562029 949939 task_signals.go:204] [ 49120: 49131] Signal 49120, PID: 49131, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.563093 949939 usertrap_amd64.go:122] [ 49132: 49132] Allocate a new trap: 0xc002381830 42 D0620 03:41:01.563158 949939 usertrap_amd64.go:225] [ 49132: 49132] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:01.563357 949939 task_exit.go:204] [ 49120: 49131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.564337 949939 task_exit.go:204] [ 49120: 49126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.564501 949939 task_exit.go:204] [ 49120: 49126] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.565282 949939 task_exit.go:204] [ 49120: 49128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.565346 949939 task_exit.go:204] [ 49120: 49128] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.567879 949939 usertrap_amd64.go:212] [ 49130: 49130] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:01.568079 949939 usertrap_amd64.go:122] [ 49130: 49130] Allocate a new trap: 0xc004592720 42 D0620 03:41:01.568217 949939 usertrap_amd64.go:225] [ 49130: 49130] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:01.571468 949939 task_exit.go:204] [ 49120: 49131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.571561 949939 task_exit.go:204] [ 49120: 49131] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.571730 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:01.572029 949939 task_exit.go:204] [ 49120: 49120] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:01 executing program 1: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) dup3(r1, r0, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:01.638029 949939 usertrap_amd64.go:212] [ 49133: 49133] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:01.638231 949939 usertrap_amd64.go:122] [ 49133: 49133] Allocate a new trap: 0xc002381800 42 D0620 03:41:01.638515 949939 usertrap_amd64.go:225] [ 49133: 49133] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:01.639002 949939 usertrap_amd64.go:212] [ 49130: 49130] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:01.639275 949939 usertrap_amd64.go:122] [ 49130: 49130] Allocate a new trap: 0xc004592720 43 D0620 03:41:01.639385 949939 usertrap_amd64.go:225] [ 49130: 49130] Apply the binary patch addr 56111a657124 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:01.651782 949939 usertrap_amd64.go:212] [ 49132: 49132] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:01.651939 949939 usertrap_amd64.go:122] [ 49132: 49132] Allocate a new trap: 0xc002381830 43 D0620 03:41:01.652040 949939 usertrap_amd64.go:225] [ 49132: 49132] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:01.662342 949939 task_exit.go:204] [ 49132: 49132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.662688 949939 task_exit.go:204] [ 49132: 49132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.662850 949939 task_signals.go:204] [ 49132: 49139] Signal 49132, PID: 49139, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.662976 949939 task_exit.go:204] [ 49132: 49139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.662994 949939 task_signals.go:204] [ 49132: 49134] Signal 49132, PID: 49134, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.663228 949939 task_exit.go:204] [ 49132: 49139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.663231 949939 task_signals.go:204] [ 49132: 49138] Signal 49132, PID: 49138, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.663280 949939 task_exit.go:204] [ 49132: 49139] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.663549 949939 task_exit.go:204] [ 49132: 49134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.663857 949939 task_exit.go:204] [ 49132: 49134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.669015 949939 task_exit.go:204] [ 49132: 49134] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.669300 949939 task_exit.go:204] [ 49132: 49138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.678512 949939 task_exit.go:204] [ 49132: 49138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.679242 949939 task_exit.go:204] [ 49132: 49138] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.679449 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:01.679740 949939 task_exit.go:204] [ 49132: 49132] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:01 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x545180, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) utime(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)={0x401, 0x6f}) fallocate(r0, 0x79, 0x10000000000, 0x3f) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000140)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0xfffffffffffffff6, 0x2) D0620 03:41:01.684030 949939 task_exit.go:204] [ 49130: 49130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.684317 949939 task_signals.go:204] [ 49130: 49135] Signal 49130, PID: 49135, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.684388 949939 task_signals.go:204] [ 49130: 49136] Signal 49130, PID: 49136, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.684493 949939 task_exit.go:204] [ 49130: 49130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.685093 949939 task_signals.go:204] [ 49130: 49137] Signal 49130, PID: 49137, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:01.685182 949939 task_exit.go:204] [ 49130: 49136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.685923 949939 task_exit.go:204] [ 49130: 49137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.686227 949939 task_exit.go:204] [ 49130: 49137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.686294 949939 task_exit.go:204] [ 49130: 49137] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.686614 949939 task_exit.go:204] [ 49130: 49135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:01.687288 949939 task_exit.go:204] [ 49130: 49136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.687363 949939 task_exit.go:204] [ 49130: 49136] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.693324 949939 task_exit.go:204] [ 49130: 49135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:01.693432 949939 task_exit.go:204] [ 49130: 49135] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.693544 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:01.694242 949939 usertrap_amd64.go:212] [ 49141: 49141] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:01.694598 949939 usertrap_amd64.go:122] [ 49141: 49141] Allocate a new trap: 0xc009c86000 40 D0620 03:41:01.695212 949939 task_exit.go:204] [ 49130: 49130] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:01.695853 949939 usertrap_amd64.go:225] [ 49141: 49141] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:01.702131 949939 usertrap_amd64.go:212] [ 49141: 49141] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:01.702234 949939 usertrap_amd64.go:122] [ 49141: 49141] Allocate a new trap: 0xc009c86000 41 D0620 03:41:01.702324 949939 usertrap_amd64.go:225] [ 49141: 49141] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) 03:41:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5450, 0x0) r3 = accept4$inet(r0, 0x0, 0x0, 0x80000) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r4, 0x5450, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @loopback}, &(0x7f0000000040)=0xc) D0620 03:41:02.097072 949939 usertrap_amd64.go:212] [ 49142: 49142] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:02.097223 949939 usertrap_amd64.go:122] [ 49142: 49142] Allocate a new trap: 0xc0093ae060 40 D0620 03:41:02.097898 949939 usertrap_amd64.go:225] [ 49142: 49142] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:02.098710 949939 usertrap_amd64.go:212] [ 49141: 49141] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:02.098868 949939 usertrap_amd64.go:122] [ 49141: 49141] Allocate a new trap: 0xc009c86000 42 D0620 03:41:02.099003 949939 usertrap_amd64.go:225] [ 49141: 49141] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:02.100692 949939 usertrap_amd64.go:212] [ 49142: 49142] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:02.100769 949939 usertrap_amd64.go:122] [ 49142: 49142] Allocate a new trap: 0xc0093ae060 41 D0620 03:41:02.100844 949939 usertrap_amd64.go:225] [ 49142: 49142] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:02.109073 949939 usertrap_amd64.go:212] [ 49144: 49144] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:02.109198 949939 usertrap_amd64.go:122] [ 49144: 49144] Allocate a new trap: 0xc0021b4090 40 D0620 03:41:02.109891 949939 usertrap_amd64.go:225] [ 49144: 49144] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:02.117098 949939 usertrap_amd64.go:212] [ 49144: 49144] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:02.117199 949939 usertrap_amd64.go:122] [ 49144: 49144] Allocate a new trap: 0xc0021b4090 41 D0620 03:41:02.117269 949939 usertrap_amd64.go:225] [ 49144: 49144] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:02.120703 949939 usertrap_amd64.go:212] [ 49142: 49142] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:02.120788 949939 usertrap_amd64.go:122] [ 49142: 49142] Allocate a new trap: 0xc0093ae060 42 D0620 03:41:02.121028 949939 usertrap_amd64.go:225] [ 49142: 49142] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:02.128436 949939 usertrap_amd64.go:212] [ 49142: 49142] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:02.128547 949939 usertrap_amd64.go:122] [ 49142: 49142] Allocate a new trap: 0xc0093ae060 43 D0620 03:41:02.128622 949939 usertrap_amd64.go:225] [ 49142: 49142] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:02.135429 949939 task_exit.go:204] [ 49142: 49142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.135856 949939 task_exit.go:204] [ 49142: 49142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.135864 949939 task_signals.go:204] [ 49142: 49148] Signal 49142, PID: 49148, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.136071 949939 task_exit.go:204] [ 49142: 49148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.136232 949939 task_signals.go:204] [ 49142: 49147] Signal 49142, PID: 49147, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.136385 949939 task_exit.go:204] [ 49142: 49147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.136493 949939 task_exit.go:204] [ 49142: 49148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.136589 949939 task_exit.go:204] [ 49142: 49148] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.143153 949939 task_exit.go:204] [ 49142: 49147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.143267 949939 task_exit.go:204] [ 49142: 49147] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.143373 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:02.143949 949939 task_exit.go:204] [ 49142: 49142] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.144514 949939 usertrap_amd64.go:212] [ 49144: 49144] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:02.144661 949939 usertrap_amd64.go:122] [ 49144: 49144] Allocate a new trap: 0xc0021b4090 42 D0620 03:41:02.144758 949939 usertrap_amd64.go:225] [ 49144: 49144] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) 03:41:02 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) chown(&(0x7f0000000140)='./bus\x00', 0xee00, 0xee00) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:02.157837 949939 usertrap_amd64.go:212] [ 49133: 49133] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:41:02.157988 949939 usertrap_amd64.go:122] [ 49133: 49133] Allocate a new trap: 0xc002381800 43 D0620 03:41:02.158100 949939 usertrap_amd64.go:225] [ 49133: 49133] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:41:02.545253 949939 usertrap_amd64.go:212] [ 49133: 49133] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:41:02.545540 949939 usertrap_amd64.go:122] [ 49133: 49133] Allocate a new trap: 0xc002381800 44 D0620 03:41:02.545696 949939 usertrap_amd64.go:225] [ 49133: 49133] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:41:02.546422 949939 usertrap_amd64.go:212] [ 49141: 49141] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:02.551560 949939 usertrap_amd64.go:122] [ 49141: 49141] Allocate a new trap: 0xc009c86000 43 D0620 03:41:02.551805 949939 usertrap_amd64.go:225] [ 49141: 49141] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:02.554056 949939 usertrap_amd64.go:212] [ 49144: 49144] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:02.554262 949939 usertrap_amd64.go:122] [ 49144: 49144] Allocate a new trap: 0xc0021b4090 43 D0620 03:41:02.555812 949939 usertrap_amd64.go:225] [ 49144: 49144] Apply the binary patch addr 56111a657124 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:02.564313 949939 usertrap_amd64.go:212] [ 49151: 49151] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:02.564512 949939 usertrap_amd64.go:122] [ 49151: 49151] Allocate a new trap: 0xc000a70060 40 D0620 03:41:02.566139 949939 usertrap_amd64.go:225] [ 49151: 49151] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:02.571549 949939 task_exit.go:204] [ 49141: 49141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.571992 949939 task_exit.go:204] [ 49141: 49141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.572080 949939 usertrap_amd64.go:212] [ 49151: 49151] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:02.572243 949939 usertrap_amd64.go:122] [ 49151: 49151] Allocate a new trap: 0xc000a70060 41 D0620 03:41:02.572578 949939 task_signals.go:204] [ 49141: 49150] Signal 49141, PID: 49150, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.572651 949939 usertrap_amd64.go:225] [ 49151: 49151] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:02.572756 949939 task_exit.go:204] [ 49141: 49150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.573067 949939 task_exit.go:204] [ 49141: 49150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.573125 949939 task_exit.go:204] [ 49141: 49150] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.573732 949939 task_exit.go:204] [ 49144: 49144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.572356 949939 task_signals.go:204] [ 49141: 49146] Signal 49141, PID: 49146, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.574228 949939 task_exit.go:204] [ 49141: 49146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.574489 949939 task_signals.go:204] [ 49144: 49149] Signal 49144, PID: 49149, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.574822 949939 task_exit.go:204] [ 49144: 49149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.575202 949939 task_exit.go:204] [ 49144: 49144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.577224 949939 task_exit.go:204] [ 49133: 49133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.577195 949939 task_signals.go:204] [ 49133: 49143] Signal 49133, PID: 49143, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.577497 949939 task_signals.go:204] [ 49133: 49140] Signal 49133, PID: 49140, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.577724 949939 task_exit.go:204] [ 49133: 49143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.577832 949939 task_signals.go:204] [ 49133: 49145] Signal 49133, PID: 49145, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:02.578016 949939 task_exit.go:204] [ 49133: 49145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.578217 949939 task_exit.go:204] [ 49133: 49143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.578274 949939 task_exit.go:204] [ 49133: 49143] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.578506 949939 task_exit.go:204] [ 49133: 49145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.578577 949939 task_exit.go:204] [ 49133: 49145] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.579801 949939 task_exit.go:204] [ 49133: 49140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:02.580694 949939 task_exit.go:204] [ 49144: 49149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.580797 949939 task_exit.go:204] [ 49144: 49149] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.581122 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:02.581602 949939 task_exit.go:204] [ 49133: 49133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.582264 949939 task_exit.go:204] [ 49144: 49144] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) (async) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5450, 0x0) r3 = accept4$inet(r0, 0x0, 0x0, 0x80000) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r4, 0x5450, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @loopback}, &(0x7f0000000040)=0xc) (async) getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @loopback}, &(0x7f0000000040)=0xc) D0620 03:41:02.589303 949939 task_exit.go:204] [ 49133: 49140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.589390 949939 task_exit.go:204] [ 49133: 49140] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.589734 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:02.590396 949939 task_exit.go:204] [ 49133: 49133] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:02 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init() ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f00000013c0)) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) (async) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x48}, {0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0x24}, {}, {0xffffffffffffffff, 0x2100}, {r2, 0x2}, {}], 0x7, 0x7fffffff) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) (async) ioctl$FIONCLEX(r3, 0x5450) r4 = syz_mount_image$fuse(&(0x7f0000001140), &(0x7f0000001180)='./file0/file1\x00', 0x1000, &(0x7f00000011c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}], [{@smackfsdef={'smackfsdef', 0x3d, '$'}}, {@subj_user={'subj_user', 0x3d, '\x00'}}]}}, 0x1, 0x0, &(0x7f0000001280)="f25aa824c7b3459fa291bb3f9159f283d2727382ed2c75e283facf8839805b5e818ddcad2a33a54e098e84761ee155594f01b592629bb3ee0d5d39897f0ab1d426c76358914846244645b427daf21a5f9c2f24580fe1239a8d967512ed80664168b12b192a9d2e2c00bcd22c86a36c50659515e39f2ae9f2de9ce91e36ab2b95c06cc498d6d0c682b7bd2b86b062f34472289548fb73b60c851f1532dec0e6e42c6fbb7703756d38291184c5b2219edf282edd8d78947e20f37c84ac382b2e20a68b358cd49ade3c46277c87293bce74086cafeb385086497e09bbd7828a6dd2e79c80") ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001380)={0x0, r4, 0x6, 0x4, 0xfff, 0xffff}) (async) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001380)={0x0, r4, 0x6, 0x4, 0xfff, 0xffff}) r5 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r5, 0x5450) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r7 = socket$inet6(0xa, 0x4, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r8, 0x5450, 0x0) inotify_add_watch(r8, &(0x7f0000001400)='./file0\x00', 0x24000000) (async) inotify_add_watch(r8, &(0x7f0000001400)='./file0\x00', 0x24000000) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r7, 0xc400941d, &(0x7f0000000580)={r6, 0x8000, 0x3, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000140)={r6, "0446b30dda9e426739df16b5698d8732"}) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:02.599358 949939 task_exit.go:204] [ 49141: 49146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:02.599423 949939 task_exit.go:204] [ 49141: 49146] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:02.599575 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:02.599844 949939 task_exit.go:204] [ 49141: 49141] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:02 executing program 1: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) dup3(r1, r0, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:02.668930 949939 usertrap_amd64.go:212] [ 49151: 49151] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:02.669073 949939 usertrap_amd64.go:122] [ 49151: 49151] Allocate a new trap: 0xc000a70060 42 D0620 03:41:02.669169 949939 usertrap_amd64.go:225] [ 49151: 49151] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:02.679284 949939 usertrap_amd64.go:212] [ 49152: 49152] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:02.679642 949939 usertrap_amd64.go:122] [ 49152: 49152] Allocate a new trap: 0xc00945e0c0 40 D0620 03:41:02.680360 949939 usertrap_amd64.go:225] [ 49152: 49152] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:02.687021 949939 usertrap_amd64.go:212] [ 49152: 49152] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:02.687255 949939 usertrap_amd64.go:122] [ 49152: 49152] Allocate a new trap: 0xc00945e0c0 41 D0620 03:41:02.687456 949939 usertrap_amd64.go:225] [ 49152: 49152] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:02.708026 949939 usertrap_amd64.go:212] [ 49152: 49152] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:02.708902 949939 usertrap_amd64.go:122] [ 49152: 49152] Allocate a new trap: 0xc00945e0c0 42 D0620 03:41:02.709138 949939 usertrap_amd64.go:225] [ 49152: 49152] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:02.710385 949939 usertrap_amd64.go:212] [ 49154: 49154] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:02.710538 949939 usertrap_amd64.go:122] [ 49154: 49154] Allocate a new trap: 0xc0030840c0 40 D0620 03:41:02.711351 949939 usertrap_amd64.go:225] [ 49154: 49154] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:02.715451 949939 usertrap_amd64.go:212] [ 49155: 49155] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:02.715565 949939 usertrap_amd64.go:122] [ 49155: 49155] Allocate a new trap: 0xc01f00e510 40 D0620 03:41:02.716309 949939 usertrap_amd64.go:225] [ 49155: 49155] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:02.726996 949939 usertrap_amd64.go:212] [ 49154: 49154] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:02.727147 949939 usertrap_amd64.go:122] [ 49154: 49154] Allocate a new trap: 0xc0030840c0 41 D0620 03:41:02.727237 949939 usertrap_amd64.go:225] [ 49154: 49154] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:02.727831 949939 usertrap_amd64.go:212] [ 49155: 49155] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:02.727896 949939 usertrap_amd64.go:122] [ 49155: 49155] Allocate a new trap: 0xc01f00e510 41 D0620 03:41:02.727975 949939 usertrap_amd64.go:225] [ 49155: 49155] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:02.803956 949939 usertrap_amd64.go:212] [ 49152: 49152] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:02.804079 949939 usertrap_amd64.go:122] [ 49152: 49152] Allocate a new trap: 0xc00945e0c0 43 D0620 03:41:02.804180 949939 usertrap_amd64.go:225] [ 49152: 49152] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:02.806096 949939 usertrap_amd64.go:212] [ 49152: 49152] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:02.806169 949939 usertrap_amd64.go:122] [ 49152: 49152] Allocate a new trap: 0xc00945e0c0 44 D0620 03:41:02.806244 949939 usertrap_amd64.go:225] [ 49152: 49152] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:02.911965 949939 usertrap_amd64.go:212] [ 49151: 49151] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:02.912103 949939 usertrap_amd64.go:122] [ 49151: 49151] Allocate a new trap: 0xc000a70060 43 D0620 03:41:02.912192 949939 usertrap_amd64.go:225] [ 49151: 49151] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:03.175378 949939 usertrap_amd64.go:212] [ 49151: 49151] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:03.175505 949939 usertrap_amd64.go:122] [ 49151: 49151] Allocate a new trap: 0xc000a70060 44 D0620 03:41:03.175610 949939 usertrap_amd64.go:225] [ 49151: 49151] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:03.183900 949939 usertrap_amd64.go:212] [ 49155: 49155] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:03.184480 949939 usertrap_amd64.go:122] [ 49155: 49155] Allocate a new trap: 0xc01f00e510 42 D0620 03:41:03.184627 949939 usertrap_amd64.go:225] [ 49155: 49155] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:03.184912 949939 task_exit.go:204] [ 49151: 49151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.185332 949939 task_signals.go:204] [ 49151: 49159] Signal 49151, PID: 49159, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.185400 949939 task_exit.go:204] [ 49151: 49151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.185792 949939 task_exit.go:204] [ 49152: 49152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.185936 949939 task_signals.go:204] [ 49151: 49153] Signal 49151, PID: 49153, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.185966 949939 task_signals.go:204] [ 49152: 49156] Signal 49152, PID: 49156, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.186055 949939 task_signals.go:204] [ 49152: 49157] Signal 49152, PID: 49157, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.186134 949939 task_exit.go:204] [ 49152: 49152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.186275 949939 task_signals.go:204] [ 49151: 49160] Signal 49151, PID: 49160, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.186354 949939 task_exit.go:204] [ 49151: 49159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.186340 949939 task_signals.go:204] [ 49151: 49158] Signal 49151, PID: 49158, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.186529 949939 task_exit.go:204] [ 49151: 49158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.186763 949939 task_exit.go:204] [ 49151: 49158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.186817 949939 task_exit.go:204] [ 49151: 49158] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.187053 949939 task_exit.go:204] [ 49151: 49159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.187115 949939 task_exit.go:204] [ 49151: 49159] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.187335 949939 task_exit.go:204] [ 49151: 49153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.187475 949939 task_exit.go:204] [ 49151: 49160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.187749 949939 task_exit.go:204] [ 49151: 49160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.187819 949939 task_exit.go:204] [ 49151: 49160] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.188438 949939 task_exit.go:204] [ 49152: 49156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.188785 949939 task_exit.go:204] [ 49152: 49157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.189047 949939 task_exit.go:204] [ 49152: 49156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.189272 949939 task_exit.go:204] [ 49152: 49156] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.199656 949939 task_exit.go:204] [ 49151: 49153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.199773 949939 task_exit.go:204] [ 49151: 49153] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.199883 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:03.200716 949939 task_exit.go:204] [ 49151: 49151] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.201943 949939 usertrap_amd64.go:212] [ 49154: 49154] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:03.202057 949939 usertrap_amd64.go:122] [ 49154: 49154] Allocate a new trap: 0xc0030840c0 42 D0620 03:41:03.202399 949939 task_exit.go:204] [ 49152: 49157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.202515 949939 task_exit.go:204] [ 49152: 49157] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.202656 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 03:41:03 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) chown(&(0x7f0000000140)='./bus\x00', 0xee00, 0xee00) (async) chown(&(0x7f0000000140)='./bus\x00', 0xee00, 0xee00) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:03.202379 949939 usertrap_amd64.go:225] [ 49154: 49154] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:03.203092 949939 task_exit.go:204] [ 49152: 49152] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async, rerun: 32) listen(r1, 0x0) (async, rerun: 32) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async, rerun: 64) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (rerun: 64) ioctl$TCSETAW(r2, 0x5450, 0x0) (async, rerun: 64) r3 = accept4$inet(r0, 0x0, 0x0, 0x80000) (rerun: 64) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r4, 0x5450, 0x0) (async) getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @loopback}, &(0x7f0000000040)=0xc) D0620 03:41:03.291141 949939 task_signals.go:470] [ 49154: 49165] Notified of signal 25 D0620 03:41:03.291365 949939 task_signals.go:204] [ 49154: 49165] Signal 49154, PID: 49165, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:03.291529 949939 task_exit.go:204] [ 49154: 49165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.291999 949939 task_signals.go:204] [ 49154: 49163] Signal 49154, PID: 49163, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.292361 949939 task_exit.go:204] [ 49154: 49165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.293621 949939 task_exit.go:204] [ 49154: 49165] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.293875 949939 task_exit.go:204] [ 49154: 49163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.294564 949939 task_exit.go:204] [ 49154: 49163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.294671 949939 task_exit.go:204] [ 49154: 49163] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.297175 949939 task_signals.go:204] [ 49154: 49154] Signal 49154, PID: 49154, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.297381 949939 task_exit.go:204] [ 49154: 49154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.297599 949939 task_exit.go:204] [ 49154: 49154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.645551 949939 usertrap_amd64.go:212] [ 49155: 49155] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:41:03.690663 949939 usertrap_amd64.go:122] [ 49155: 49155] Allocate a new trap: 0xc01f00e510 43 D0620 03:41:03.690812 949939 usertrap_amd64.go:225] [ 49155: 49155] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:41:03.691378 949939 task_signals.go:204] [ 49154: 49164] Signal 49154, PID: 49164, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:03.691648 949939 task_exit.go:204] [ 49154: 49164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:03.696444 949939 usertrap_amd64.go:212] [ 49166: 49166] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:03.696580 949939 usertrap_amd64.go:122] [ 49166: 49166] Allocate a new trap: 0xc001a6e300 40 D0620 03:41:03.697324 949939 task_exit.go:204] [ 49154: 49164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:03.697640 949939 task_exit.go:204] [ 49154: 49164] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:03.697490 949939 usertrap_amd64.go:225] [ 49166: 49166] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:03.697896 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:03.698333 949939 task_exit.go:204] [ 49154: 49154] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:03 executing program 1: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) dup3(r1, r0, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:03.707974 949939 usertrap_amd64.go:212] [ 49166: 49166] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:03.708107 949939 usertrap_amd64.go:122] [ 49166: 49166] Allocate a new trap: 0xc001a6e300 41 D0620 03:41:03.708215 949939 usertrap_amd64.go:225] [ 49166: 49166] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:03.728859 949939 usertrap_amd64.go:212] [ 49175: 49175] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:03.729108 949939 usertrap_amd64.go:122] [ 49175: 49175] Allocate a new trap: 0xc001a6e330 40 D0620 03:41:03.729940 949939 usertrap_amd64.go:225] [ 49175: 49175] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:03.734820 949939 usertrap_amd64.go:212] [ 49175: 49175] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:03.734942 949939 usertrap_amd64.go:122] [ 49175: 49175] Allocate a new trap: 0xc001a6e330 41 D0620 03:41:03.735028 949939 usertrap_amd64.go:225] [ 49175: 49175] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:03.738697 949939 usertrap_amd64.go:212] [ 49166: 49166] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:03.738787 949939 usertrap_amd64.go:122] [ 49166: 49166] Allocate a new trap: 0xc001a6e300 42 D0620 03:41:03.739082 949939 usertrap_amd64.go:225] [ 49166: 49166] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:03.751013 949939 usertrap_amd64.go:212] [ 49176: 49176] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:03.751149 949939 usertrap_amd64.go:122] [ 49176: 49176] Allocate a new trap: 0xc0066f2360 40 D0620 03:41:03.751779 949939 usertrap_amd64.go:225] [ 49176: 49176] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:03.756684 949939 usertrap_amd64.go:212] [ 49176: 49176] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:03.756848 949939 usertrap_amd64.go:122] [ 49176: 49176] Allocate a new trap: 0xc0066f2360 41 D0620 03:41:03.756935 949939 usertrap_amd64.go:225] [ 49176: 49176] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:03.774404 949939 usertrap_amd64.go:212] [ 49175: 49175] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:03.774523 949939 usertrap_amd64.go:122] [ 49175: 49175] Allocate a new trap: 0xc001a6e330 42 D0620 03:41:03.774594 949939 usertrap_amd64.go:225] [ 49175: 49175] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:03.791570 949939 usertrap_amd64.go:212] [ 49176: 49176] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:03.791715 949939 usertrap_amd64.go:122] [ 49176: 49176] Allocate a new trap: 0xc0066f2360 42 D0620 03:41:03.791782 949939 usertrap_amd64.go:225] [ 49176: 49176] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:03.930138 949939 usertrap_amd64.go:212] [ 49176: 49176] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:03.930235 949939 usertrap_amd64.go:122] [ 49176: 49176] Allocate a new trap: 0xc0066f2360 43 D0620 03:41:03.930324 949939 usertrap_amd64.go:225] [ 49176: 49176] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:03.943021 949939 usertrap_amd64.go:212] [ 49175: 49175] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:03.943297 949939 usertrap_amd64.go:122] [ 49175: 49175] Allocate a new trap: 0xc001a6e330 43 D0620 03:41:03.943927 949939 usertrap_amd64.go:225] [ 49175: 49175] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:03.977405 949939 usertrap_amd64.go:212] [ 49166: 49166] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:03.977603 949939 usertrap_amd64.go:122] [ 49166: 49166] Allocate a new trap: 0xc001a6e300 43 D0620 03:41:03.977762 949939 usertrap_amd64.go:225] [ 49166: 49166] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:04.012365 949939 usertrap_amd64.go:212] [ 49155: 49155] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:41:04.012533 949939 usertrap_amd64.go:122] [ 49155: 49155] Allocate a new trap: 0xc01f00e510 44 D0620 03:41:04.012719 949939 usertrap_amd64.go:225] [ 49155: 49155] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:41:04.187631 949939 usertrap_amd64.go:212] [ 49166: 49166] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:04.187761 949939 usertrap_amd64.go:122] [ 49166: 49166] Allocate a new trap: 0xc001a6e300 44 D0620 03:41:04.201389 949939 usertrap_amd64.go:212] [ 49176: 49176] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:04.201791 949939 usertrap_amd64.go:122] [ 49176: 49176] Allocate a new trap: 0xc0066f2360 44 D0620 03:41:04.201885 949939 usertrap_amd64.go:225] [ 49176: 49176] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:04.187860 949939 usertrap_amd64.go:225] [ 49166: 49166] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:04.209749 949939 task_exit.go:204] [ 49155: 49155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.209997 949939 task_exit.go:204] [ 49155: 49155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.210161 949939 task_signals.go:204] [ 49155: 49173] Signal 49155, PID: 49173, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.210395 949939 task_exit.go:204] [ 49155: 49173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.210691 949939 task_exit.go:204] [ 49155: 49173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.210820 949939 task_exit.go:204] [ 49155: 49173] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.211038 949939 task_signals.go:204] [ 49155: 49167] Signal 49155, PID: 49167, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.211476 949939 task_signals.go:204] [ 49155: 49162] Signal 49155, PID: 49162, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.211612 949939 task_signals.go:204] [ 49155: 49168] Signal 49155, PID: 49168, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.211196 949939 task_signals.go:204] [ 49155: 49171] Signal 49155, PID: 49171, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.211744 949939 task_signals.go:204] [ 49155: 49169] Signal 49155, PID: 49169, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.211733 949939 task_exit.go:204] [ 49155: 49167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.211929 949939 task_signals.go:204] [ 49155: 49170] Signal 49155, PID: 49170, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.212251 949939 task_signals.go:204] [ 49155: 49172] Signal 49155, PID: 49172, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.212386 949939 task_signals.go:204] [ 49155: 49174] Signal 49155, PID: 49174, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.212415 949939 task_exit.go:204] [ 49155: 49162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.213132 949939 task_signals.go:204] [ 49155: 49161] Signal 49155, PID: 49161, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.213321 949939 task_exit.go:204] [ 49155: 49174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.213584 949939 task_exit.go:204] [ 49155: 49174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.213687 949939 task_exit.go:204] [ 49155: 49174] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.213865 949939 task_exit.go:204] [ 49155: 49168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.214018 949939 task_exit.go:204] [ 49155: 49162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.214129 949939 task_exit.go:204] [ 49155: 49162] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.214477 949939 task_exit.go:204] [ 49155: 49171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.214707 949939 task_exit.go:204] [ 49155: 49171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.214826 949939 task_exit.go:204] [ 49155: 49171] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.215032 949939 task_exit.go:204] [ 49155: 49169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.215173 949939 task_exit.go:204] [ 49155: 49170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.215249 949939 task_exit.go:204] [ 49155: 49161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.215399 949939 task_exit.go:204] [ 49155: 49172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.215706 949939 task_exit.go:204] [ 49155: 49167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.215780 949939 task_exit.go:204] [ 49155: 49167] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.221080 949939 task_exit.go:204] [ 49155: 49168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.221161 949939 task_exit.go:204] [ 49155: 49168] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.221407 949939 task_signals.go:204] [ 49176: 49187] Signal 49176, PID: 49187, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.221517 949939 task_signals.go:204] [ 49176: 49181] Signal 49176, PID: 49181, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.221664 949939 task_signals.go:204] [ 49176: 49186] Signal 49176, PID: 49186, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.221780 949939 task_signals.go:204] [ 49176: 49188] Signal 49176, PID: 49188, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.221424 949939 task_signals.go:204] [ 49176: 49180] Signal 49176, PID: 49180, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.221932 949939 task_exit.go:204] [ 49155: 49172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.221974 949939 task_exit.go:204] [ 49155: 49172] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.222114 949939 task_exit.go:204] [ 49155: 49169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.222180 949939 task_exit.go:204] [ 49155: 49169] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.222261 949939 task_exit.go:204] [ 49176: 49176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.222430 949939 task_exit.go:204] [ 49176: 49176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.222515 949939 task_exit.go:204] [ 49176: 49187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.222790 949939 task_exit.go:204] [ 49155: 49170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.222863 949939 task_exit.go:204] [ 49155: 49170] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.223050 949939 task_exit.go:204] [ 49176: 49181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.223354 949939 task_exit.go:204] [ 49176: 49181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.223408 949939 task_exit.go:204] [ 49176: 49181] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.223672 949939 task_exit.go:204] [ 49176: 49186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.223906 949939 task_exit.go:204] [ 49176: 49186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.223996 949939 task_exit.go:204] [ 49176: 49186] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.224112 949939 task_exit.go:204] [ 49176: 49180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.224343 949939 task_exit.go:204] [ 49176: 49188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.224727 949939 task_exit.go:204] [ 49176: 49180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.224795 949939 task_exit.go:204] [ 49176: 49180] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.225815 949939 task_exit.go:204] [ 49176: 49187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.225885 949939 task_exit.go:204] [ 49176: 49187] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.232086 949939 task_exit.go:204] [ 49155: 49161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.232271 949939 task_exit.go:204] [ 49155: 49161] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.232411 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:04.232526 949939 task_exit.go:204] [ 49155: 49155] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.234143 949939 usertrap_amd64.go:212] [ 49175: 49175] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:04.234219 949939 usertrap_amd64.go:122] [ 49175: 49175] Allocate a new trap: 0xc001a6e330 44 D0620 03:41:04.234300 949939 usertrap_amd64.go:225] [ 49175: 49175] Apply the binary patch addr 56111a657124 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) 03:41:04 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = inotify_init() ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f00000013c0)) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x48}, {0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0x24}, {}, {0xffffffffffffffff, 0x2100}, {r2, 0x2}, {}], 0x7, 0x7fffffff) (async) r3 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) (async) r4 = syz_mount_image$fuse(&(0x7f0000001140), &(0x7f0000001180)='./file0/file1\x00', 0x1000, &(0x7f00000011c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}], [{@smackfsdef={'smackfsdef', 0x3d, '$'}}, {@subj_user={'subj_user', 0x3d, '\x00'}}]}}, 0x1, 0x0, &(0x7f0000001280)="f25aa824c7b3459fa291bb3f9159f283d2727382ed2c75e283facf8839805b5e818ddcad2a33a54e098e84761ee155594f01b592629bb3ee0d5d39897f0ab1d426c76358914846244645b427daf21a5f9c2f24580fe1239a8d967512ed80664168b12b192a9d2e2c00bcd22c86a36c50659515e39f2ae9f2de9ce91e36ab2b95c06cc498d6d0c682b7bd2b86b062f34472289548fb73b60c851f1532dec0e6e42c6fbb7703756d38291184c5b2219edf282edd8d78947e20f37c84ac382b2e20a68b358cd49ade3c46277c87293bce74086cafeb385086497e09bbd7828a6dd2e79c80") ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001380)={0x0, r4, 0x6, 0x4, 0xfff, 0xffff}) r5 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r5, 0x5450) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) r7 = socket$inet6(0xa, 0x4, 0x0) (async) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r8, 0x5450, 0x0) inotify_add_watch(r8, &(0x7f0000001400)='./file0\x00', 0x24000000) (async) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r7, 0xc400941d, &(0x7f0000000580)={r6, 0x8000, 0x3, 0x1}) (async) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000140)={r6, "0446b30dda9e426739df16b5698d8732"}) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:04.235211 949939 task_exit.go:204] [ 49166: 49166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.235496 949939 task_exit.go:204] [ 49166: 49166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.235746 949939 task_signals.go:204] [ 49166: 49178] Signal 49166, PID: 49178, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.235893 949939 task_exit.go:204] [ 49166: 49178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.236153 949939 task_exit.go:204] [ 49166: 49178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.236254 949939 task_exit.go:204] [ 49166: 49178] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.236396 949939 task_signals.go:204] [ 49166: 49177] Signal 49166, PID: 49177, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.236648 949939 task_exit.go:204] [ 49166: 49177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.236873 949939 task_signals.go:204] [ 49166: 49182] Signal 49166, PID: 49182, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.236830 949939 task_signals.go:204] [ 49166: 49185] Signal 49166, PID: 49185, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.237037 949939 task_signals.go:204] [ 49166: 49189] Signal 49166, PID: 49189, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.237168 949939 task_exit.go:204] [ 49166: 49177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.237219 949939 task_exit.go:204] [ 49166: 49177] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.237358 949939 task_exit.go:204] [ 49166: 49182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.237486 949939 task_exit.go:204] [ 49166: 49185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.237764 949939 task_exit.go:204] [ 49166: 49185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.237831 949939 task_exit.go:204] [ 49166: 49185] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.238201 949939 task_exit.go:204] [ 49166: 49189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.238760 949939 task_exit.go:204] [ 49166: 49182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.238813 949939 task_exit.go:204] [ 49166: 49182] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.239633 949939 task_exit.go:204] [ 49176: 49188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.239696 949939 task_exit.go:204] [ 49176: 49188] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.239776 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:04.240852 949939 task_exit.go:204] [ 49176: 49176] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:04 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x505042, 0x2) socket$unix(0x1, 0x5, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:04.246304 949939 task_exit.go:204] [ 49166: 49189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.246416 949939 task_exit.go:204] [ 49166: 49189] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.246598 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:04.248586 949939 task_exit.go:204] [ 49166: 49166] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:04 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) chown(&(0x7f0000000140)='./bus\x00', 0xee00, 0xee00) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:04.309471 949939 task_exit.go:204] [ 49175: 49175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.309905 949939 task_signals.go:204] [ 49175: 49184] Signal 49175, PID: 49184, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.309980 949939 task_exit.go:204] [ 49175: 49175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.310451 949939 task_signals.go:204] [ 49175: 49179] Signal 49175, PID: 49179, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.310422 949939 task_signals.go:204] [ 49175: 49190] Signal 49175, PID: 49190, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.310524 949939 task_exit.go:204] [ 49175: 49184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.310951 949939 task_signals.go:204] [ 49175: 49183] Signal 49175, PID: 49183, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.311127 949939 task_exit.go:204] [ 49175: 49179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.311368 949939 task_exit.go:204] [ 49175: 49190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.311647 949939 task_exit.go:204] [ 49175: 49190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.311701 949939 task_exit.go:204] [ 49175: 49190] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.311983 949939 task_exit.go:204] [ 49175: 49184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.312031 949939 task_exit.go:204] [ 49175: 49184] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.314525 949939 task_exit.go:204] [ 49175: 49183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.314975 949939 task_exit.go:204] [ 49175: 49179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.315055 949939 task_exit.go:204] [ 49175: 49179] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.320371 949939 task_exit.go:204] [ 49175: 49183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.320449 949939 task_exit.go:204] [ 49175: 49183] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.320538 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:04.321083 949939 task_exit.go:204] [ 49175: 49175] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm], 0x2) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x6, 0x1000, @empty}, 0x1c) listen(r1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000080)={0x6, 'veth0\x00', {0x80000001}, 0x7fff}) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r0, 0x0) r5 = dup(r4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e24, 0x89c, @private1, 0x5}, 0x1c) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:04.364586 949939 usertrap_amd64.go:212] [ 49191: 49191] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:04.364766 949939 usertrap_amd64.go:122] [ 49191: 49191] Allocate a new trap: 0xc00037ec30 40 D0620 03:41:04.365651 949939 usertrap_amd64.go:225] [ 49191: 49191] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:04.366258 949939 usertrap_amd64.go:212] [ 49193: 49193] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:04.366413 949939 usertrap_amd64.go:122] [ 49193: 49193] Allocate a new trap: 0xc00037ec60 40 D0620 03:41:04.369028 949939 usertrap_amd64.go:225] [ 49193: 49193] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:04.373660 949939 usertrap_amd64.go:212] [ 49191: 49191] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:04.373801 949939 usertrap_amd64.go:122] [ 49191: 49191] Allocate a new trap: 0xc00037ec30 41 D0620 03:41:04.373964 949939 usertrap_amd64.go:225] [ 49191: 49191] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:04.380398 949939 usertrap_amd64.go:212] [ 49192: 49192] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:04.380543 949939 usertrap_amd64.go:122] [ 49192: 49192] Allocate a new trap: 0xc00945e720 40 D0620 03:41:04.381790 949939 usertrap_amd64.go:225] [ 49192: 49192] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:04.393364 949939 usertrap_amd64.go:212] [ 49193: 49193] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:04.393448 949939 usertrap_amd64.go:122] [ 49193: 49193] Allocate a new trap: 0xc00037ec60 41 D0620 03:41:04.393595 949939 usertrap_amd64.go:225] [ 49193: 49193] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:04.452901 949939 usertrap_amd64.go:212] [ 49194: 49194] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:04.453040 949939 usertrap_amd64.go:122] [ 49194: 49194] Allocate a new trap: 0xc0030843c0 40 D0620 03:41:04.453739 949939 usertrap_amd64.go:225] [ 49194: 49194] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:04.462989 949939 usertrap_amd64.go:212] [ 49192: 49192] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:04.463126 949939 usertrap_amd64.go:122] [ 49192: 49192] Allocate a new trap: 0xc00945e720 41 D0620 03:41:04.463269 949939 usertrap_amd64.go:225] [ 49192: 49192] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:04.467445 949939 usertrap_amd64.go:212] [ 49194: 49194] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:04.467553 949939 usertrap_amd64.go:122] [ 49194: 49194] Allocate a new trap: 0xc0030843c0 41 D0620 03:41:04.467718 949939 usertrap_amd64.go:225] [ 49194: 49194] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:04.475466 949939 usertrap_amd64.go:212] [ 49193: 49193] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:04.475542 949939 usertrap_amd64.go:122] [ 49193: 49193] Allocate a new trap: 0xc00037ec60 42 D0620 03:41:04.475740 949939 usertrap_amd64.go:225] [ 49193: 49193] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:04.489316 949939 usertrap_amd64.go:212] [ 49191: 49191] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:04.489402 949939 usertrap_amd64.go:122] [ 49191: 49191] Allocate a new trap: 0xc00037ec30 42 D0620 03:41:04.489855 949939 usertrap_amd64.go:225] [ 49191: 49191] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:04.496139 949939 usertrap_amd64.go:212] [ 49193: 49193] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:04.496302 949939 usertrap_amd64.go:122] [ 49193: 49193] Allocate a new trap: 0xc00037ec60 43 D0620 03:41:04.496400 949939 usertrap_amd64.go:225] [ 49193: 49193] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:04.504344 949939 usertrap_amd64.go:212] [ 49192: 49192] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:04.504612 949939 usertrap_amd64.go:122] [ 49192: 49192] Allocate a new trap: 0xc00945e720 42 D0620 03:41:04.504863 949939 usertrap_amd64.go:225] [ 49192: 49192] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:04.506234 949939 task_exit.go:204] [ 49193: 49193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.507168 949939 task_exit.go:204] [ 49193: 49193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.507742 949939 task_signals.go:204] [ 49193: 49195] Signal 49193, PID: 49195, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:04.508226 949939 task_exit.go:204] [ 49193: 49195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:04.516362 949939 task_exit.go:204] [ 49193: 49195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:04.516453 949939 task_exit.go:204] [ 49193: 49195] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:04.516549 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:04.518898 949939 task_exit.go:204] [ 49193: 49193] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:04 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x505042, 0x2) socket$unix(0x1, 0x5, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:04.958256 949939 usertrap_amd64.go:212] [ 49194: 49194] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:04.958371 949939 usertrap_amd64.go:122] [ 49194: 49194] Allocate a new trap: 0xc0030843c0 42 D0620 03:41:04.958441 949939 usertrap_amd64.go:225] [ 49194: 49194] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:04.967751 949939 usertrap_amd64.go:212] [ 49194: 49200] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:41:04.968114 949939 usertrap_amd64.go:122] [ 49194: 49200] Allocate a new trap: 0xc0030843c0 43 D0620 03:41:04.968334 949939 usertrap_amd64.go:225] [ 49194: 49200] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:05.078778 949939 usertrap_amd64.go:212] [ 49194: 49194] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:05.078884 949939 usertrap_amd64.go:122] [ 49194: 49194] Allocate a new trap: 0xc0030843c0 44 D0620 03:41:05.079002 949939 usertrap_amd64.go:225] [ 49194: 49194] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:05.081495 949939 usertrap_amd64.go:212] [ 49191: 49191] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:05.081576 949939 usertrap_amd64.go:122] [ 49191: 49191] Allocate a new trap: 0xc00037ec30 43 D0620 03:41:05.081656 949939 usertrap_amd64.go:225] [ 49191: 49191] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:05.427403 949939 usertrap_amd64.go:212] [ 49194: 49194] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:05.427544 949939 usertrap_amd64.go:122] [ 49194: 49194] Allocate a new trap: 0xc0030843c0 45 D0620 03:41:05.427618 949939 usertrap_amd64.go:225] [ 49194: 49194] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:41:05.428562 949939 usertrap_amd64.go:212] [ 49191: 49191] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:05.428664 949939 usertrap_amd64.go:122] [ 49191: 49191] Allocate a new trap: 0xc00037ec30 44 D0620 03:41:05.428742 949939 usertrap_amd64.go:225] [ 49191: 49191] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:05.438244 949939 task_exit.go:204] [ 49194: 49194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.438462 949939 task_signals.go:204] [ 49194: 49206] Signal 49194, PID: 49206, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.438587 949939 task_exit.go:204] [ 49194: 49194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.438748 949939 task_signals.go:204] [ 49194: 49200] Signal 49194, PID: 49200, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.438870 949939 task_exit.go:204] [ 49194: 49200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.439049 949939 task_exit.go:204] [ 49194: 49200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.439095 949939 task_exit.go:204] [ 49194: 49200] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.439217 949939 task_exit.go:204] [ 49194: 49206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.444542 949939 task_exit.go:204] [ 49191: 49191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.445008 949939 task_signals.go:204] [ 49191: 49203] Signal 49191, PID: 49203, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.445188 949939 task_signals.go:204] [ 49191: 49205] Signal 49191, PID: 49205, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.445295 949939 task_signals.go:204] [ 49191: 49199] Signal 49191, PID: 49199, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.445407 949939 task_signals.go:204] [ 49191: 49202] Signal 49191, PID: 49202, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.445194 949939 task_signals.go:204] [ 49191: 49196] Signal 49191, PID: 49196, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.445478 949939 task_exit.go:204] [ 49191: 49191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.445752 949939 task_exit.go:204] [ 49191: 49196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.446599 949939 task_exit.go:204] [ 49191: 49196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.446756 949939 task_exit.go:204] [ 49191: 49196] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.447785 949939 task_exit.go:204] [ 49191: 49202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.447920 949939 task_exit.go:204] [ 49191: 49203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.448048 949939 task_exit.go:204] [ 49191: 49205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.448246 949939 task_exit.go:204] [ 49191: 49199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.449100 949939 task_exit.go:204] [ 49191: 49203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.449181 949939 task_exit.go:204] [ 49191: 49203] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.451325 949939 task_exit.go:204] [ 49191: 49202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.451388 949939 task_exit.go:204] [ 49191: 49202] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.451557 949939 task_exit.go:204] [ 49191: 49205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.451630 949939 task_exit.go:204] [ 49191: 49205] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.451768 949939 task_exit.go:204] [ 49194: 49206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.451836 949939 task_exit.go:204] [ 49194: 49206] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.451924 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:05.452433 949939 task_exit.go:204] [ 49194: 49194] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm], 0x2) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x6, 0x1000, @empty}, 0x1c) (async) listen(r1, 0x0) (async) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000080)={0x6, 'veth0\x00', {0x80000001}, 0x7fff}) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (async) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) (async) r4 = dup3(0xffffffffffffffff, r0, 0x0) r5 = dup(r4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e24, 0x89c, @private1, 0x5}, 0x1c) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:05.457618 949939 usertrap_amd64.go:212] [ 49192: 49192] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:41:05.457698 949939 usertrap_amd64.go:122] [ 49192: 49192] Allocate a new trap: 0xc00945e720 43 D0620 03:41:05.457850 949939 usertrap_amd64.go:225] [ 49192: 49192] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:41:05.459404 949939 task_exit.go:204] [ 49191: 49199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.459497 949939 task_exit.go:204] [ 49191: 49199] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.459620 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:05.459994 949939 task_exit.go:204] [ 49191: 49191] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:05 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffef, 0xfffdffffffffffff}) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES8=r1, @ANYRES8=r1], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$FICLONE(r0, 0x40049409, r2) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000003c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x5080) write$P9_RREADDIR(r3, &(0x7f0000000240)={0x14d, 0x29, 0x1, {0x1, [{{0x4, 0x2, 0x1}, 0x7fff, 0x8, 0x7, './file0'}, {{0x40, 0x3, 0x3}, 0xffffffffffffffff, 0x3, 0x5, './bus'}, {{0x4, 0x4, 0x8}, 0x200, 0x5, 0xd, './file0/file1'}, {{0x0, 0x2, 0x3}, 0x1, 0x0, 0x5, './bus'}, {{0x10, 0x4, 0x2}, 0x9, 0xfd, 0x7, './file0'}, {{0x1, 0x1}, 0xa6d7, 0x63, 0x5, './bus'}, {{0x8, 0x0, 0x4}, 0xc3, 0x9b, 0x7, './file1'}, {{0x80, 0x1, 0x8}, 0x8, 0x3b, 0x7, './file0'}, {{0x10, 0x4, 0x5}, 0xadc, 0x5, 0xd, './file0/file1'}, {{0x4, 0x1, 0x1}, 0x873, 0xff, 0xd, './file0/file1'}]}}, 0x14d) openat(r0, &(0x7f0000000400)='./file1\x00', 0x208401, 0x8) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:05.549335 949939 usertrap_amd64.go:212] [ 49192: 49192] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:41:05.549523 949939 usertrap_amd64.go:122] [ 49192: 49192] Allocate a new trap: 0xc00945e720 44 D0620 03:41:05.549774 949939 usertrap_amd64.go:225] [ 49192: 49192] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:41:05.554362 949939 usertrap_amd64.go:212] [ 49209: 49209] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:05.554519 949939 usertrap_amd64.go:122] [ 49209: 49209] Allocate a new trap: 0xc0066f2390 40 D0620 03:41:05.555599 949939 usertrap_amd64.go:225] [ 49209: 49209] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:05.556735 949939 task_exit.go:204] [ 49192: 49192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.557033 949939 task_exit.go:204] [ 49192: 49192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.557145 949939 task_signals.go:204] [ 49192: 49198] Signal 49192, PID: 49198, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.557233 949939 task_signals.go:204] [ 49192: 49208] Signal 49192, PID: 49208, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.557278 949939 task_exit.go:204] [ 49192: 49198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.557527 949939 task_signals.go:204] [ 49192: 49197] Signal 49192, PID: 49197, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.557548 949939 task_exit.go:204] [ 49192: 49198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.557625 949939 task_exit.go:204] [ 49192: 49198] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.557731 949939 task_signals.go:204] [ 49192: 49204] Signal 49192, PID: 49204, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.557799 949939 task_signals.go:204] [ 49192: 49201] Signal 49192, PID: 49201, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.557841 949939 task_exit.go:204] [ 49192: 49204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.558000 949939 task_signals.go:204] [ 49192: 49207] Signal 49192, PID: 49207, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.558105 949939 task_exit.go:204] [ 49192: 49201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.558346 949939 task_exit.go:204] [ 49192: 49201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.558392 949939 task_exit.go:204] [ 49192: 49201] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.558916 949939 task_exit.go:204] [ 49192: 49197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.559057 949939 task_exit.go:204] [ 49192: 49208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.559132 949939 task_exit.go:204] [ 49192: 49207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.559368 949939 task_exit.go:204] [ 49192: 49208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.559475 949939 task_exit.go:204] [ 49192: 49208] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.559857 949939 task_exit.go:204] [ 49192: 49197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.559996 949939 task_exit.go:204] [ 49192: 49197] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.560269 949939 task_exit.go:204] [ 49192: 49207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.560398 949939 task_exit.go:204] [ 49192: 49207] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.570168 949939 task_exit.go:204] [ 49192: 49204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.570977 949939 task_exit.go:204] [ 49192: 49204] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.571159 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:05.571395 949939 task_exit.go:204] [ 49192: 49192] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:05 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) fallocate(r1, 0x8, 0x82, 0x7) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:05.589362 949939 usertrap_amd64.go:212] [ 49209: 49209] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:05.589467 949939 usertrap_amd64.go:122] [ 49209: 49209] Allocate a new trap: 0xc0066f2390 41 D0620 03:41:05.589585 949939 usertrap_amd64.go:225] [ 49209: 49209] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:05.597601 949939 usertrap_amd64.go:212] [ 49210: 49210] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:05.597890 949939 usertrap_amd64.go:122] [ 49210: 49210] Allocate a new trap: 0xc00945e990 40 D0620 03:41:05.598643 949939 usertrap_amd64.go:225] [ 49210: 49210] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:05.606403 949939 usertrap_amd64.go:212] [ 49210: 49210] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:05.606505 949939 usertrap_amd64.go:122] [ 49210: 49210] Allocate a new trap: 0xc00945e990 41 D0620 03:41:05.606577 949939 usertrap_amd64.go:225] [ 49210: 49210] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:05.618780 949939 usertrap_amd64.go:212] [ 49212: 49212] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:05.618943 949939 usertrap_amd64.go:122] [ 49212: 49212] Allocate a new trap: 0xc002b2e270 40 D0620 03:41:05.619908 949939 usertrap_amd64.go:225] [ 49212: 49212] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:05.620045 949939 usertrap_amd64.go:212] [ 49209: 49209] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:05.620158 949939 usertrap_amd64.go:122] [ 49209: 49209] Allocate a new trap: 0xc0066f2390 42 D0620 03:41:05.620330 949939 usertrap_amd64.go:225] [ 49209: 49209] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:05.626476 949939 usertrap_amd64.go:212] [ 49212: 49212] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:05.626578 949939 usertrap_amd64.go:122] [ 49212: 49212] Allocate a new trap: 0xc002b2e270 41 D0620 03:41:05.626666 949939 usertrap_amd64.go:225] [ 49212: 49212] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:05.638386 949939 usertrap_amd64.go:212] [ 49209: 49209] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:05.638571 949939 usertrap_amd64.go:122] [ 49209: 49209] Allocate a new trap: 0xc0066f2390 43 D0620 03:41:05.638810 949939 usertrap_amd64.go:225] [ 49209: 49209] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:05.641523 949939 usertrap_amd64.go:212] [ 49210: 49210] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:05.641617 949939 usertrap_amd64.go:122] [ 49210: 49210] Allocate a new trap: 0xc00945e990 42 D0620 03:41:05.641682 949939 usertrap_amd64.go:225] [ 49210: 49210] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:05.715336 949939 task_exit.go:204] [ 49209: 49209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.715650 949939 task_signals.go:204] [ 49209: 49214] Signal 49209, PID: 49214, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.715760 949939 task_signals.go:204] [ 49209: 49215] Signal 49209, PID: 49215, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.715776 949939 task_exit.go:204] [ 49209: 49209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.716276 949939 task_signals.go:204] [ 49209: 49213] Signal 49209, PID: 49213, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:05.716649 949939 task_exit.go:204] [ 49209: 49214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.716799 949939 task_exit.go:204] [ 49209: 49215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.717012 949939 task_exit.go:204] [ 49209: 49213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:05.717681 949939 task_exit.go:204] [ 49209: 49215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.717795 949939 task_exit.go:204] [ 49209: 49215] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.718351 949939 task_exit.go:204] [ 49209: 49213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.718425 949939 task_exit.go:204] [ 49209: 49213] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.723206 949939 task_exit.go:204] [ 49209: 49214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:05.723313 949939 task_exit.go:204] [ 49209: 49214] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:05.723406 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:05.724005 949939 task_exit.go:204] [ 49209: 49209] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:05 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x505042, 0x2) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x505042, 0x2) socket$unix(0x1, 0x5, 0x0) (async) socket$unix(0x1, 0x5, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:05.728231 949939 usertrap_amd64.go:212] [ 49212: 49212] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:05.728374 949939 usertrap_amd64.go:122] [ 49212: 49212] Allocate a new trap: 0xc002b2e270 42 D0620 03:41:05.728489 949939 usertrap_amd64.go:225] [ 49212: 49212] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:05.730793 949939 usertrap_amd64.go:212] [ 49211: 49211] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:05.730916 949939 usertrap_amd64.go:122] [ 49211: 49211] Allocate a new trap: 0xc003084540 40 D0620 03:41:05.733317 949939 usertrap_amd64.go:225] [ 49211: 49211] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:05.733830 949939 usertrap_amd64.go:212] [ 49210: 49216] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:41:05.733934 949939 usertrap_amd64.go:122] [ 49210: 49216] Allocate a new trap: 0xc00945e990 43 D0620 03:41:05.734135 949939 usertrap_amd64.go:225] [ 49210: 49216] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:05.747492 949939 usertrap_amd64.go:212] [ 49210: 49210] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:05.747603 949939 usertrap_amd64.go:122] [ 49210: 49210] Allocate a new trap: 0xc00945e990 44 D0620 03:41:05.747675 949939 usertrap_amd64.go:225] [ 49210: 49210] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:05.754336 949939 usertrap_amd64.go:212] [ 49211: 49211] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:05.754419 949939 usertrap_amd64.go:122] [ 49211: 49211] Allocate a new trap: 0xc003084540 41 D0620 03:41:05.754482 949939 usertrap_amd64.go:225] [ 49211: 49211] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:05.767945 949939 usertrap_amd64.go:212] [ 49221: 49221] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:05.768043 949939 usertrap_amd64.go:122] [ 49221: 49221] Allocate a new trap: 0xc000a701e0 40 D0620 03:41:05.768909 949939 usertrap_amd64.go:225] [ 49221: 49221] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:05.780694 949939 usertrap_amd64.go:212] [ 49221: 49221] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:05.780779 949939 usertrap_amd64.go:122] [ 49221: 49221] Allocate a new trap: 0xc000a701e0 41 D0620 03:41:05.780846 949939 usertrap_amd64.go:225] [ 49221: 49221] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:05.807273 949939 usertrap_amd64.go:212] [ 49211: 49211] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:05.807368 949939 usertrap_amd64.go:122] [ 49211: 49211] Allocate a new trap: 0xc003084540 42 D0620 03:41:05.807434 949939 usertrap_amd64.go:225] [ 49211: 49211] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:05.948973 949939 usertrap_amd64.go:212] [ 49212: 49212] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:41:05.949058 949939 usertrap_amd64.go:122] [ 49212: 49212] Allocate a new trap: 0xc002b2e270 43 D0620 03:41:05.949204 949939 usertrap_amd64.go:225] [ 49212: 49212] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:41:06.124490 949939 usertrap_amd64.go:212] [ 49211: 49211] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:06.124585 949939 usertrap_amd64.go:122] [ 49211: 49211] Allocate a new trap: 0xc003084540 43 D0620 03:41:06.124687 949939 usertrap_amd64.go:225] [ 49211: 49211] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:06.169892 949939 usertrap_amd64.go:212] [ 49212: 49212] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:41:06.170003 949939 usertrap_amd64.go:122] [ 49212: 49212] Allocate a new trap: 0xc002b2e270 44 D0620 03:41:06.170072 949939 usertrap_amd64.go:225] [ 49212: 49212] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:41:06.175020 949939 usertrap_amd64.go:212] [ 49211: 49211] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:06.175104 949939 usertrap_amd64.go:122] [ 49211: 49211] Allocate a new trap: 0xc003084540 44 D0620 03:41:06.175211 949939 usertrap_amd64.go:225] [ 49211: 49211] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:06.178360 949939 task_exit.go:204] [ 49212: 49212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.178517 949939 task_signals.go:204] [ 49212: 49226] Signal 49212, PID: 49226, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.178501 949939 task_signals.go:204] [ 49212: 49222] Signal 49212, PID: 49222, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.178670 949939 task_exit.go:204] [ 49212: 49226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.178880 949939 task_signals.go:204] [ 49212: 49218] Signal 49212, PID: 49218, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.178934 949939 task_exit.go:204] [ 49212: 49212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.179550 949939 task_exit.go:204] [ 49212: 49218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.179559 949939 task_signals.go:204] [ 49212: 49224] Signal 49212, PID: 49224, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.179814 949939 task_exit.go:204] [ 49212: 49224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.180065 949939 task_exit.go:204] [ 49212: 49224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.180117 949939 task_exit.go:204] [ 49212: 49224] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.180449 949939 task_exit.go:204] [ 49212: 49218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.180531 949939 task_exit.go:204] [ 49212: 49218] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.181646 949939 task_exit.go:204] [ 49212: 49222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.182143 949939 task_exit.go:204] [ 49212: 49226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.182218 949939 task_exit.go:204] [ 49212: 49226] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.183127 949939 task_exit.go:204] [ 49211: 49211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.183549 949939 task_exit.go:204] [ 49211: 49211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.183776 949939 task_signals.go:204] [ 49211: 49229] Signal 49211, PID: 49229, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.183901 949939 task_exit.go:204] [ 49211: 49229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.184184 949939 task_exit.go:204] [ 49211: 49229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.184284 949939 task_exit.go:204] [ 49211: 49229] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.184763 949939 task_signals.go:204] [ 49211: 49223] Signal 49211, PID: 49223, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.185062 949939 task_signals.go:204] [ 49211: 49228] Signal 49211, PID: 49228, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.185039 949939 task_signals.go:204] [ 49211: 49225] Signal 49211, PID: 49225, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.185108 949939 task_exit.go:204] [ 49211: 49223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.184908 949939 task_signals.go:204] [ 49211: 49227] Signal 49211, PID: 49227, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.185373 949939 task_exit.go:204] [ 49211: 49228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.185728 949939 task_exit.go:204] [ 49211: 49228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.185787 949939 task_exit.go:204] [ 49211: 49228] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.186636 949939 task_exit.go:204] [ 49211: 49223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.186730 949939 task_exit.go:204] [ 49211: 49223] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.186825 949939 task_exit.go:204] [ 49211: 49225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.187112 949939 task_exit.go:204] [ 49211: 49225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.187150 949939 task_exit.go:204] [ 49211: 49225] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.187244 949939 task_exit.go:204] [ 49211: 49227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.188854 949939 task_exit.go:204] [ 49212: 49222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.188927 949939 task_exit.go:204] [ 49212: 49222] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.189130 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:06.191358 949939 task_exit.go:204] [ 49212: 49212] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.193727 949939 task_exit.go:204] [ 49211: 49227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.193787 949939 task_exit.go:204] [ 49211: 49227] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.193873 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 03:41:06 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) fallocate(r1, 0x8, 0x82, 0x7) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:06.194898 949939 task_exit.go:204] [ 49211: 49211] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:06 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffef, 0xfffdffffffffffff}) (async) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffef, 0xfffdffffffffffff}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES8=r1, @ANYRES8=r1], 0x0, 0x0, 0x0) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES8=r1, @ANYRES8=r1], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$FICLONE(r0, 0x40049409, r2) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000003c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x5080) write$P9_RREADDIR(r3, &(0x7f0000000240)={0x14d, 0x29, 0x1, {0x1, [{{0x4, 0x2, 0x1}, 0x7fff, 0x8, 0x7, './file0'}, {{0x40, 0x3, 0x3}, 0xffffffffffffffff, 0x3, 0x5, './bus'}, {{0x4, 0x4, 0x8}, 0x200, 0x5, 0xd, './file0/file1'}, {{0x0, 0x2, 0x3}, 0x1, 0x0, 0x5, './bus'}, {{0x10, 0x4, 0x2}, 0x9, 0xfd, 0x7, './file0'}, {{0x1, 0x1}, 0xa6d7, 0x63, 0x5, './bus'}, {{0x8, 0x0, 0x4}, 0xc3, 0x9b, 0x7, './file1'}, {{0x80, 0x1, 0x8}, 0x8, 0x3b, 0x7, './file0'}, {{0x10, 0x4, 0x5}, 0xadc, 0x5, 0xd, './file0/file1'}, {{0x4, 0x1, 0x1}, 0x873, 0xff, 0xd, './file0/file1'}]}}, 0x14d) (async) write$P9_RREADDIR(r3, &(0x7f0000000240)={0x14d, 0x29, 0x1, {0x1, [{{0x4, 0x2, 0x1}, 0x7fff, 0x8, 0x7, './file0'}, {{0x40, 0x3, 0x3}, 0xffffffffffffffff, 0x3, 0x5, './bus'}, {{0x4, 0x4, 0x8}, 0x200, 0x5, 0xd, './file0/file1'}, {{0x0, 0x2, 0x3}, 0x1, 0x0, 0x5, './bus'}, {{0x10, 0x4, 0x2}, 0x9, 0xfd, 0x7, './file0'}, {{0x1, 0x1}, 0xa6d7, 0x63, 0x5, './bus'}, {{0x8, 0x0, 0x4}, 0xc3, 0x9b, 0x7, './file1'}, {{0x80, 0x1, 0x8}, 0x8, 0x3b, 0x7, './file0'}, {{0x10, 0x4, 0x5}, 0xadc, 0x5, 0xd, './file0/file1'}, {{0x4, 0x1, 0x1}, 0x873, 0xff, 0xd, './file0/file1'}]}}, 0x14d) openat(r0, &(0x7f0000000400)='./file1\x00', 0x208401, 0x8) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:06.203094 949939 usertrap_amd64.go:212] [ 49221: 49221] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:06.203269 949939 usertrap_amd64.go:122] [ 49221: 49221] Allocate a new trap: 0xc000a701e0 42 D0620 03:41:06.203521 949939 usertrap_amd64.go:225] [ 49221: 49221] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:06.293360 949939 usertrap_amd64.go:212] [ 49221: 49221] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:06.293546 949939 usertrap_amd64.go:122] [ 49221: 49221] Allocate a new trap: 0xc000a701e0 43 D0620 03:41:06.294020 949939 usertrap_amd64.go:225] [ 49221: 49221] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:06.312505 949939 task_exit.go:204] [ 49221: 49221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.312727 949939 task_signals.go:204] [ 49221: 49231] Signal 49221, PID: 49231, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.312835 949939 task_exit.go:204] [ 49221: 49221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.313023 949939 task_signals.go:204] [ 49221: 49230] Signal 49221, PID: 49230, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.313911 949939 task_exit.go:204] [ 49221: 49230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.314181 949939 task_exit.go:204] [ 49221: 49230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.314325 949939 task_exit.go:204] [ 49221: 49230] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.317813 949939 task_exit.go:204] [ 49221: 49231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.319910 949939 usertrap_amd64.go:212] [ 49232: 49232] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:06.320093 949939 usertrap_amd64.go:122] [ 49232: 49232] Allocate a new trap: 0xc0066f2510 40 D0620 03:41:06.321638 949939 usertrap_amd64.go:225] [ 49232: 49232] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:06.322840 949939 usertrap_amd64.go:212] [ 49233: 49233] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:06.322956 949939 usertrap_amd64.go:122] [ 49233: 49233] Allocate a new trap: 0xc0066f2540 40 D0620 03:41:06.323705 949939 usertrap_amd64.go:225] [ 49233: 49233] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:06.324594 949939 task_exit.go:204] [ 49221: 49231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.324666 949939 task_exit.go:204] [ 49221: 49231] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.324804 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:06.325090 949939 task_exit.go:204] [ 49221: 49221] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:06 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x18, 0x0, 0x21d42a89) r1 = socket$inet6(0xa, 0x4, 0x4) fallocate(r1, 0x5e, 0x9, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x204400, 0x0) fallocate(r2, 0x8, 0xffff, 0x7) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:06.327839 949939 usertrap_amd64.go:212] [ 49233: 49233] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:06.327900 949939 usertrap_amd64.go:122] [ 49233: 49233] Allocate a new trap: 0xc0066f2540 41 D0620 03:41:06.328037 949939 usertrap_amd64.go:225] [ 49233: 49233] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:06.348703 949939 usertrap_amd64.go:212] [ 49232: 49232] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:06.348819 949939 usertrap_amd64.go:122] [ 49232: 49232] Allocate a new trap: 0xc0066f2510 41 D0620 03:41:06.348906 949939 usertrap_amd64.go:225] [ 49232: 49232] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:06.353010 949939 usertrap_amd64.go:212] [ 49233: 49233] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:06.353113 949939 usertrap_amd64.go:122] [ 49233: 49233] Allocate a new trap: 0xc0066f2540 42 D0620 03:41:06.353332 949939 usertrap_amd64.go:225] [ 49233: 49233] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:06.382064 949939 task_signals.go:470] [ 49233: 49234] Notified of signal 25 D0620 03:41:06.382354 949939 task_signals.go:204] [ 49233: 49234] Signal 49233, PID: 49234, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:06.382538 949939 task_exit.go:204] [ 49233: 49234] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.382739 949939 task_signals.go:204] [ 49233: 49233] Signal 49233, PID: 49233, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.382785 949939 task_exit.go:204] [ 49233: 49234] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.382914 949939 task_exit.go:204] [ 49233: 49234] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.383090 949939 task_exit.go:204] [ 49233: 49233] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.383086 949939 task_signals.go:204] [ 49233: 49235] Signal 49233, PID: 49235, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.383271 949939 task_exit.go:204] [ 49233: 49235] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.383672 949939 task_exit.go:204] [ 49233: 49233] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.389635 949939 task_exit.go:204] [ 49233: 49235] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.389727 949939 task_exit.go:204] [ 49233: 49235] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.389885 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:06.390513 949939 task_exit.go:204] [ 49233: 49233] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:06 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffef, 0xfffdffffffffffff}) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES8=r1, @ANYRES8=r1], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$FICLONE(r0, 0x40049409, r2) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000003c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x5080) write$P9_RREADDIR(r3, &(0x7f0000000240)={0x14d, 0x29, 0x1, {0x1, [{{0x4, 0x2, 0x1}, 0x7fff, 0x8, 0x7, './file0'}, {{0x40, 0x3, 0x3}, 0xffffffffffffffff, 0x3, 0x5, './bus'}, {{0x4, 0x4, 0x8}, 0x200, 0x5, 0xd, './file0/file1'}, {{0x0, 0x2, 0x3}, 0x1, 0x0, 0x5, './bus'}, {{0x10, 0x4, 0x2}, 0x9, 0xfd, 0x7, './file0'}, {{0x1, 0x1}, 0xa6d7, 0x63, 0x5, './bus'}, {{0x8, 0x0, 0x4}, 0xc3, 0x9b, 0x7, './file1'}, {{0x80, 0x1, 0x8}, 0x8, 0x3b, 0x7, './file0'}, {{0x10, 0x4, 0x5}, 0xadc, 0x5, 0xd, './file0/file1'}, {{0x4, 0x1, 0x1}, 0x873, 0xff, 0xd, './file0/file1'}]}}, 0x14d) openat(r0, &(0x7f0000000400)='./file1\x00', 0x208401, 0x8) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x9, &(0x7f0000000100)={0xffffffffffffffef, 0xfffdffffffffffff}) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) ioctl$FIONCLEX(r1, 0x5450) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES8=r1, @ANYRES8=r1], 0x0, 0x0, 0x0) (async) ioctl$FIONCLEX(r2, 0x5450) (async) ioctl$FICLONE(r0, 0x40049409, r2) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000003c0)) (async) pipe2(&(0x7f0000000140), 0x5080) (async) write$P9_RREADDIR(r3, &(0x7f0000000240)={0x14d, 0x29, 0x1, {0x1, [{{0x4, 0x2, 0x1}, 0x7fff, 0x8, 0x7, './file0'}, {{0x40, 0x3, 0x3}, 0xffffffffffffffff, 0x3, 0x5, './bus'}, {{0x4, 0x4, 0x8}, 0x200, 0x5, 0xd, './file0/file1'}, {{0x0, 0x2, 0x3}, 0x1, 0x0, 0x5, './bus'}, {{0x10, 0x4, 0x2}, 0x9, 0xfd, 0x7, './file0'}, {{0x1, 0x1}, 0xa6d7, 0x63, 0x5, './bus'}, {{0x8, 0x0, 0x4}, 0xc3, 0x9b, 0x7, './file1'}, {{0x80, 0x1, 0x8}, 0x8, 0x3b, 0x7, './file0'}, {{0x10, 0x4, 0x5}, 0xadc, 0x5, 0xd, './file0/file1'}, {{0x4, 0x1, 0x1}, 0x873, 0xff, 0xd, './file0/file1'}]}}, 0x14d) (async) openat(r0, &(0x7f0000000400)='./file1\x00', 0x208401, 0x8) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) D0620 03:41:06.397273 949939 usertrap_amd64.go:212] [ 49232: 49232] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:06.397402 949939 usertrap_amd64.go:122] [ 49232: 49232] Allocate a new trap: 0xc0066f2510 42 D0620 03:41:06.397475 949939 usertrap_amd64.go:225] [ 49232: 49232] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:06.461212 949939 usertrap_amd64.go:212] [ 49210: 49210] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:06.461328 949939 usertrap_amd64.go:122] [ 49210: 49210] Allocate a new trap: 0xc00945e990 45 D0620 03:41:06.461405 949939 usertrap_amd64.go:225] [ 49210: 49210] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:41:06.467275 949939 task_exit.go:204] [ 49210: 49210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.467612 949939 task_exit.go:204] [ 49210: 49210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.467842 949939 task_signals.go:204] [ 49210: 49216] Signal 49210, PID: 49216, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.468000 949939 task_exit.go:204] [ 49210: 49216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.468311 949939 task_exit.go:204] [ 49210: 49216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.468393 949939 task_exit.go:204] [ 49210: 49216] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.469364 949939 task_signals.go:204] [ 49210: 49219] Signal 49210, PID: 49219, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.469361 949939 task_signals.go:204] [ 49210: 49220] Signal 49210, PID: 49220, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.471010 949939 task_signals.go:204] [ 49210: 49217] Signal 49210, PID: 49217, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.471609 949939 task_exit.go:204] [ 49210: 49219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.471909 949939 task_exit.go:204] [ 49210: 49220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.472086 949939 task_exit.go:204] [ 49210: 49217] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.472423 949939 task_exit.go:204] [ 49210: 49217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.472491 949939 task_exit.go:204] [ 49210: 49217] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.473724 949939 task_exit.go:204] [ 49210: 49220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.473792 949939 task_exit.go:204] [ 49210: 49220] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.482020 949939 task_exit.go:204] [ 49210: 49219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.482165 949939 task_exit.go:204] [ 49210: 49219] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.482313 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:06.483139 949939 task_exit.go:204] [ 49210: 49210] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 64) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') (rerun: 64) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm], 0x2) (async) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x6, 0x1000, @empty}, 0x1c) (async, rerun: 64) listen(r1, 0x0) (async, rerun: 64) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000080)={0x6, 'veth0\x00', {0x80000001}, 0x7fff}) (async, rerun: 32) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) (rerun: 32) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r0, 0x0) r5 = dup(r4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e24, 0x89c, @private1, 0x5}, 0x1c) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:06.526914 949939 usertrap_amd64.go:212] [ 49232: 49232] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:41:06.527115 949939 usertrap_amd64.go:122] [ 49232: 49232] Allocate a new trap: 0xc0066f2510 43 D0620 03:41:06.528282 949939 usertrap_amd64.go:225] [ 49232: 49232] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:41:06.855214 949939 usertrap_amd64.go:212] [ 49236: 49236] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:06.855357 949939 usertrap_amd64.go:122] [ 49236: 49236] Allocate a new trap: 0xc0030847b0 40 D0620 03:41:06.856105 949939 usertrap_amd64.go:225] [ 49236: 49236] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:06.856787 949939 usertrap_amd64.go:212] [ 49232: 49232] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:41:06.856905 949939 usertrap_amd64.go:122] [ 49232: 49232] Allocate a new trap: 0xc0066f2510 44 D0620 03:41:06.857077 949939 usertrap_amd64.go:225] [ 49232: 49232] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:41:06.862281 949939 usertrap_amd64.go:212] [ 49240: 49240] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:06.862433 949939 usertrap_amd64.go:122] [ 49240: 49240] Allocate a new trap: 0xc001a6e960 40 D0620 03:41:06.863030 949939 usertrap_amd64.go:225] [ 49240: 49240] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:06.863682 949939 task_exit.go:204] [ 49232: 49232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.864018 949939 task_signals.go:204] [ 49232: 49237] Signal 49232, PID: 49237, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.864139 949939 task_signals.go:204] [ 49232: 49239] Signal 49232, PID: 49239, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.864176 949939 task_exit.go:204] [ 49232: 49237] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.863900 949939 task_signals.go:204] [ 49232: 49238] Signal 49232, PID: 49238, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.864458 949939 task_exit.go:204] [ 49232: 49239] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.864700 949939 task_signals.go:204] [ 49232: 49241] Signal 49232, PID: 49241, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.864850 949939 task_exit.go:204] [ 49232: 49237] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.864832 949939 task_signals.go:204] [ 49232: 49242] Signal 49232, PID: 49242, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.864900 949939 task_exit.go:204] [ 49232: 49237] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.865044 949939 usertrap_amd64.go:212] [ 49236: 49236] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:06.865106 949939 usertrap_amd64.go:122] [ 49236: 49236] Allocate a new trap: 0xc0030847b0 41 D0620 03:41:06.865216 949939 usertrap_amd64.go:225] [ 49236: 49236] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:06.865381 949939 task_exit.go:204] [ 49232: 49241] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.865620 949939 task_exit.go:204] [ 49232: 49241] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.865677 949939 task_exit.go:204] [ 49232: 49241] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.865885 949939 task_exit.go:204] [ 49232: 49232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.866232 949939 task_exit.go:204] [ 49232: 49238] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.866463 949939 task_exit.go:204] [ 49232: 49238] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.866511 949939 task_exit.go:204] [ 49232: 49238] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.866637 949939 task_exit.go:204] [ 49232: 49242] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.866955 949939 task_exit.go:204] [ 49232: 49242] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.867020 949939 task_exit.go:204] [ 49232: 49242] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.867822 949939 usertrap_amd64.go:212] [ 49240: 49240] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:06.867900 949939 usertrap_amd64.go:122] [ 49240: 49240] Allocate a new trap: 0xc001a6e960 41 D0620 03:41:06.867983 949939 usertrap_amd64.go:225] [ 49240: 49240] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:06.874131 949939 task_exit.go:204] [ 49232: 49239] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.874266 949939 task_exit.go:204] [ 49232: 49239] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.874453 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:06.875653 949939 task_exit.go:204] [ 49232: 49232] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:06 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) fallocate(r1, 0x8, 0x82, 0x7) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:06.887253 949939 usertrap_amd64.go:212] [ 49236: 49236] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:06.887390 949939 usertrap_amd64.go:122] [ 49236: 49236] Allocate a new trap: 0xc0030847b0 42 D0620 03:41:06.887486 949939 usertrap_amd64.go:225] [ 49236: 49236] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:06.971908 949939 usertrap_amd64.go:212] [ 49243: 49243] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:06.972061 949939 usertrap_amd64.go:122] [ 49243: 49243] Allocate a new trap: 0xc0066f2750 40 D0620 03:41:06.972822 949939 usertrap_amd64.go:225] [ 49243: 49243] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:06.973473 949939 usertrap_amd64.go:212] [ 49236: 49236] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:06.973641 949939 usertrap_amd64.go:122] [ 49236: 49236] Allocate a new trap: 0xc0030847b0 43 D0620 03:41:06.973734 949939 usertrap_amd64.go:225] [ 49236: 49236] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:06.974072 949939 usertrap_amd64.go:212] [ 49240: 49240] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:06.974219 949939 usertrap_amd64.go:122] [ 49240: 49240] Allocate a new trap: 0xc001a6e960 42 D0620 03:41:06.974393 949939 usertrap_amd64.go:225] [ 49240: 49240] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:06.979078 949939 task_exit.go:204] [ 49236: 49236] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.979459 949939 task_signals.go:204] [ 49236: 49244] Signal 49236, PID: 49244, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.979622 949939 task_exit.go:204] [ 49236: 49236] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.979953 949939 task_exit.go:204] [ 49236: 49244] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.980800 949939 usertrap_amd64.go:212] [ 49243: 49243] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:06.980916 949939 usertrap_amd64.go:122] [ 49243: 49243] Allocate a new trap: 0xc0066f2750 41 D0620 03:41:06.981035 949939 usertrap_amd64.go:225] [ 49243: 49243] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:06.987549 949939 task_exit.go:204] [ 49236: 49244] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.987615 949939 task_exit.go:204] [ 49236: 49244] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.987729 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:06.987953 949939 task_exit.go:204] [ 49236: 49236] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.989143 949939 task_signals.go:470] [ 49240: 49246] Notified of signal 25 D0620 03:41:06.989295 949939 task_signals.go:204] [ 49240: 49246] Signal 49240, PID: 49246, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:06.989520 949939 task_exit.go:204] [ 49240: 49246] Transitioning from exit state TaskExitNone to TaskExitInitiated 03:41:06 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x18, 0x0, 0x21d42a89) r1 = socket$inet6(0xa, 0x4, 0x4) fallocate(r1, 0x5e, 0x9, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x204400, 0x0) (async) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x204400, 0x0) fallocate(r2, 0x8, 0xffff, 0x7) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:06.990246 949939 task_signals.go:204] [ 49240: 49240] Signal 49240, PID: 49240, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:06.990437 949939 task_exit.go:204] [ 49240: 49240] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:06.991027 949939 task_exit.go:204] [ 49240: 49246] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.991147 949939 task_exit.go:204] [ 49240: 49246] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.992183 949939 usertrap_amd64.go:212] [ 49245: 49245] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:06.992277 949939 usertrap_amd64.go:122] [ 49245: 49245] Allocate a new trap: 0xc009c86630 40 D0620 03:41:06.993525 949939 usertrap_amd64.go:225] [ 49245: 49245] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:06.996906 949939 task_exit.go:204] [ 49240: 49240] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:06.997052 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:06.997345 949939 task_exit.go:204] [ 49240: 49240] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:06.998246 949939 usertrap_amd64.go:212] [ 49245: 49245] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:06.998330 949939 usertrap_amd64.go:122] [ 49245: 49245] Allocate a new trap: 0xc009c86630 41 D0620 03:41:06.998424 949939 usertrap_amd64.go:225] [ 49245: 49245] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) 03:41:06 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x52d000, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = getpid() prlimit64(r1, 0x2, &(0x7f0000000140)={0x2, 0x7f}, &(0x7f0000000180)) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:07.020682 949939 usertrap_amd64.go:212] [ 49243: 49243] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:07.020819 949939 usertrap_amd64.go:122] [ 49243: 49243] Allocate a new trap: 0xc0066f2750 42 D0620 03:41:07.020912 949939 usertrap_amd64.go:225] [ 49243: 49243] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:07.026382 949939 usertrap_amd64.go:212] [ 49245: 49245] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:07.026513 949939 usertrap_amd64.go:122] [ 49245: 49245] Allocate a new trap: 0xc009c86630 42 D0620 03:41:07.026590 949939 usertrap_amd64.go:225] [ 49245: 49245] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:07.036473 949939 usertrap_amd64.go:212] [ 49243: 49251] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:41:07.036562 949939 usertrap_amd64.go:122] [ 49243: 49251] Allocate a new trap: 0xc0066f2750 43 D0620 03:41:07.036651 949939 usertrap_amd64.go:225] [ 49243: 49251] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:07.054220 949939 usertrap_amd64.go:212] [ 49247: 49247] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:07.054362 949939 usertrap_amd64.go:122] [ 49247: 49247] Allocate a new trap: 0xc009c86840 40 D0620 03:41:07.055435 949939 usertrap_amd64.go:225] [ 49247: 49247] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:07.057816 949939 usertrap_amd64.go:212] [ 49249: 49249] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:07.058004 949939 usertrap_amd64.go:122] [ 49249: 49249] Allocate a new trap: 0xc0021b46f0 40 D0620 03:41:07.058610 949939 usertrap_amd64.go:225] [ 49249: 49249] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:07.059989 949939 usertrap_amd64.go:212] [ 49247: 49247] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:07.060119 949939 usertrap_amd64.go:122] [ 49247: 49247] Allocate a new trap: 0xc009c86840 41 D0620 03:41:07.060189 949939 usertrap_amd64.go:225] [ 49247: 49247] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:07.060709 949939 usertrap_amd64.go:212] [ 49249: 49249] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:07.060783 949939 usertrap_amd64.go:122] [ 49249: 49249] Allocate a new trap: 0xc0021b46f0 41 D0620 03:41:07.060855 949939 usertrap_amd64.go:225] [ 49249: 49249] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:07.083886 949939 usertrap_amd64.go:212] [ 49249: 49249] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:07.084156 949939 usertrap_amd64.go:122] [ 49249: 49249] Allocate a new trap: 0xc0021b46f0 42 D0620 03:41:07.084281 949939 usertrap_amd64.go:225] [ 49249: 49249] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:07.091585 949939 usertrap_amd64.go:212] [ 49247: 49247] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:07.091674 949939 usertrap_amd64.go:122] [ 49247: 49247] Allocate a new trap: 0xc009c86840 42 D0620 03:41:07.091761 949939 usertrap_amd64.go:212] [ 49249: 49249] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:07.091820 949939 usertrap_amd64.go:122] [ 49249: 49249] Allocate a new trap: 0xc0021b46f0 43 D0620 03:41:07.091880 949939 usertrap_amd64.go:225] [ 49247: 49247] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:07.092011 949939 usertrap_amd64.go:225] [ 49249: 49249] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:07.096501 949939 task_exit.go:204] [ 49249: 49249] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.096648 949939 task_signals.go:204] [ 49249: 49255] Signal 49249, PID: 49255, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.096829 949939 task_exit.go:204] [ 49249: 49255] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.097205 949939 task_exit.go:204] [ 49249: 49249] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.102228 949939 task_exit.go:204] [ 49249: 49255] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.102341 949939 task_exit.go:204] [ 49249: 49255] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.102427 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:07.102696 949939 task_exit.go:204] [ 49249: 49249] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:07 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x52d000, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) r1 = getpid() prlimit64(r1, 0x2, &(0x7f0000000140)={0x2, 0x7f}, &(0x7f0000000180)) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:07.152220 949939 usertrap_amd64.go:212] [ 49243: 49243] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:07.152426 949939 usertrap_amd64.go:122] [ 49243: 49243] Allocate a new trap: 0xc0066f2750 44 D0620 03:41:07.152633 949939 usertrap_amd64.go:225] [ 49243: 49243] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:07.252902 949939 usertrap_amd64.go:212] [ 49245: 49245] Found the pattern at ip 55e1e03de0aa:sysno 230 D0620 03:41:07.253036 949939 usertrap_amd64.go:122] [ 49245: 49245] Allocate a new trap: 0xc009c86630 43 D0620 03:41:07.253176 949939 usertrap_amd64.go:225] [ 49245: 49245] Apply the binary patch addr 55e1e03de0aa trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0620 03:41:07.285466 949939 usertrap_amd64.go:212] [ 49247: 49247] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:07.285570 949939 usertrap_amd64.go:122] [ 49247: 49247] Allocate a new trap: 0xc009c86840 43 D0620 03:41:07.286036 949939 usertrap_amd64.go:225] [ 49247: 49247] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:07.470094 949939 usertrap_amd64.go:212] [ 49245: 49245] Found the pattern at ip 55e1e036b124:sysno 3 D0620 03:41:07.470230 949939 usertrap_amd64.go:122] [ 49245: 49245] Allocate a new trap: 0xc009c86630 44 D0620 03:41:07.470286 949939 usertrap_amd64.go:212] [ 49247: 49247] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:07.470487 949939 usertrap_amd64.go:122] [ 49247: 49247] Allocate a new trap: 0xc009c86840 44 D0620 03:41:07.470558 949939 usertrap_amd64.go:225] [ 49247: 49247] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:07.470398 949939 usertrap_amd64.go:225] [ 49245: 49245] Apply the binary patch addr 55e1e036b124 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0620 03:41:07.483847 949939 task_exit.go:204] [ 49247: 49247] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.484108 949939 task_signals.go:204] [ 49247: 49257] Signal 49247, PID: 49257, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.484245 949939 task_exit.go:204] [ 49247: 49257] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.484439 949939 task_exit.go:204] [ 49247: 49257] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.484504 949939 task_exit.go:204] [ 49247: 49257] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.485040 949939 task_exit.go:204] [ 49247: 49247] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.484800 949939 task_signals.go:204] [ 49247: 49256] Signal 49247, PID: 49256, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.485251 949939 task_exit.go:204] [ 49247: 49256] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.485554 949939 task_signals.go:204] [ 49247: 49259] Signal 49247, PID: 49259, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.485658 949939 task_exit.go:204] [ 49247: 49259] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.485932 949939 task_exit.go:204] [ 49247: 49259] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.486102 949939 task_exit.go:204] [ 49247: 49259] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.486397 949939 task_signals.go:204] [ 49247: 49260] Signal 49247, PID: 49260, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.486481 949939 task_exit.go:204] [ 49247: 49260] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.486823 949939 task_exit.go:204] [ 49247: 49260] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.486871 949939 task_exit.go:204] [ 49247: 49260] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.497416 949939 task_exit.go:204] [ 49247: 49256] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.497488 949939 task_exit.go:204] [ 49247: 49256] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.497588 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:07.498187 949939 task_exit.go:204] [ 49245: 49245] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.498555 949939 task_signals.go:204] [ 49245: 49261] Signal 49245, PID: 49261, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.498652 949939 task_exit.go:204] [ 49245: 49261] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.498576 949939 task_signals.go:204] [ 49245: 49250] Signal 49245, PID: 49250, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.498852 949939 task_exit.go:204] [ 49245: 49261] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.498995 949939 task_exit.go:204] [ 49245: 49261] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.499118 949939 task_signals.go:204] [ 49245: 49252] Signal 49245, PID: 49252, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.499147 949939 task_signals.go:204] [ 49245: 49262] Signal 49245, PID: 49262, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.499362 949939 task_signals.go:204] [ 49245: 49258] Signal 49245, PID: 49258, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.499343 949939 task_exit.go:204] [ 49245: 49245] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.499684 949939 task_exit.go:204] [ 49245: 49250] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.499870 949939 task_exit.go:204] [ 49245: 49250] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.499910 949939 task_exit.go:204] [ 49245: 49250] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.500024 949939 task_exit.go:204] [ 49247: 49247] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.500250 949939 task_exit.go:204] [ 49245: 49252] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.500560 949939 task_exit.go:204] [ 49245: 49252] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.500636 949939 task_exit.go:204] [ 49245: 49252] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.500783 949939 task_exit.go:204] [ 49245: 49262] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.501012 949939 task_exit.go:204] [ 49245: 49262] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.501085 949939 task_exit.go:204] [ 49245: 49262] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.501224 949939 task_exit.go:204] [ 49245: 49258] Transitioning from exit state TaskExitNone to TaskExitInitiated 03:41:07 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x18, 0x0, 0x21d42a89) (async) fallocate(r0, 0x18, 0x0, 0x21d42a89) socket$inet6(0xa, 0x4, 0x4) (async) r1 = socket$inet6(0xa, 0x4, 0x4) fallocate(r1, 0x5e, 0x9, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x204400, 0x0) fallocate(r2, 0x8, 0xffff, 0x7) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:07.507503 949939 task_exit.go:204] [ 49245: 49258] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.507598 949939 task_exit.go:204] [ 49245: 49258] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.507695 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:07.508473 949939 task_exit.go:204] [ 49245: 49245] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:07 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xf7ffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:07.515629 949939 usertrap_amd64.go:212] [ 49263: 49263] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:07.515755 949939 usertrap_amd64.go:122] [ 49263: 49263] Allocate a new trap: 0xc009a00ab0 40 D0620 03:41:07.516611 949939 usertrap_amd64.go:225] [ 49263: 49263] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:07.519746 949939 usertrap_amd64.go:212] [ 49263: 49263] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:07.519852 949939 usertrap_amd64.go:122] [ 49263: 49263] Allocate a new trap: 0xc009a00ab0 41 D0620 03:41:07.519923 949939 usertrap_amd64.go:225] [ 49263: 49263] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:07.610011 949939 usertrap_amd64.go:212] [ 49263: 49263] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:07.610145 949939 usertrap_amd64.go:122] [ 49263: 49263] Allocate a new trap: 0xc009a00ab0 42 D0620 03:41:07.610519 949939 usertrap_amd64.go:212] [ 49265: 49265] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:07.610574 949939 usertrap_amd64.go:225] [ 49263: 49263] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:07.610631 949939 usertrap_amd64.go:122] [ 49265: 49265] Allocate a new trap: 0xc000d0ac00 40 D0620 03:41:07.614559 949939 usertrap_amd64.go:225] [ 49265: 49265] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:07.619053 949939 usertrap_amd64.go:212] [ 49265: 49265] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:07.619192 949939 usertrap_amd64.go:122] [ 49265: 49265] Allocate a new trap: 0xc000d0ac00 41 D0620 03:41:07.619303 949939 usertrap_amd64.go:225] [ 49265: 49265] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:07.621869 949939 usertrap_amd64.go:212] [ 49264: 49264] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:07.621986 949939 usertrap_amd64.go:122] [ 49264: 49264] Allocate a new trap: 0xc0021b4720 40 D0620 03:41:07.622526 949939 usertrap_amd64.go:225] [ 49264: 49264] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:07.627436 949939 usertrap_amd64.go:212] [ 49264: 49264] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:07.627613 949939 usertrap_amd64.go:122] [ 49264: 49264] Allocate a new trap: 0xc0021b4720 41 D0620 03:41:07.627702 949939 usertrap_amd64.go:225] [ 49264: 49264] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:07.653618 949939 usertrap_amd64.go:212] [ 49263: 49263] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:07.653734 949939 usertrap_amd64.go:122] [ 49263: 49263] Allocate a new trap: 0xc009a00ab0 43 D0620 03:41:07.653803 949939 usertrap_amd64.go:225] [ 49263: 49263] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:07.665860 949939 usertrap_amd64.go:212] [ 49265: 49265] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:07.665978 949939 usertrap_amd64.go:122] [ 49265: 49265] Allocate a new trap: 0xc000d0ac00 42 D0620 03:41:07.666152 949939 usertrap_amd64.go:225] [ 49265: 49265] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:07.666705 949939 task_exit.go:204] [ 49263: 49263] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.666924 949939 task_exit.go:204] [ 49263: 49263] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.667085 949939 task_signals.go:204] [ 49263: 49268] Signal 49263, PID: 49268, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.667141 949939 task_signals.go:204] [ 49263: 49267] Signal 49263, PID: 49267, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.667193 949939 task_exit.go:204] [ 49263: 49268] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.667367 949939 task_exit.go:204] [ 49263: 49267] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.667570 949939 task_exit.go:204] [ 49263: 49267] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.667619 949939 task_exit.go:204] [ 49263: 49267] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.667746 949939 task_exit.go:204] [ 49263: 49268] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.667791 949939 task_exit.go:204] [ 49263: 49268] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.667181 949939 task_signals.go:204] [ 49263: 49266] Signal 49263, PID: 49266, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.668590 949939 task_exit.go:204] [ 49263: 49266] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.672037 949939 usertrap_amd64.go:212] [ 49264: 49264] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:07.672127 949939 usertrap_amd64.go:122] [ 49264: 49264] Allocate a new trap: 0xc0021b4720 42 D0620 03:41:07.672207 949939 usertrap_amd64.go:225] [ 49264: 49264] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:07.673078 949939 task_exit.go:204] [ 49263: 49266] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.673149 949939 task_exit.go:204] [ 49263: 49266] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.673234 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:07.673670 949939 task_exit.go:204] [ 49263: 49263] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:07 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x52d000, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = getpid() prlimit64(r1, 0x2, &(0x7f0000000140)={0x2, 0x7f}, &(0x7f0000000180)) (async, rerun: 32) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (rerun: 32) D0620 03:41:07.691258 949939 task_signals.go:470] [ 49264: 49270] Notified of signal 25 D0620 03:41:07.691846 949939 task_signals.go:204] [ 49264: 49270] Signal 49264, PID: 49270, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:07.692201 949939 task_exit.go:204] [ 49264: 49270] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.692538 949939 task_signals.go:204] [ 49264: 49264] Signal 49264, PID: 49264, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.692703 949939 task_exit.go:204] [ 49264: 49270] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.694550 949939 task_exit.go:204] [ 49264: 49270] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.695010 949939 task_exit.go:204] [ 49264: 49264] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.700829 949939 task_exit.go:204] [ 49264: 49264] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.700921 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:07.701435 949939 task_exit.go:204] [ 49264: 49264] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.709244 949939 usertrap_amd64.go:212] [ 49265: 49265] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:07.709329 949939 usertrap_amd64.go:122] [ 49265: 49265] Allocate a new trap: 0xc000d0ac00 43 D0620 03:41:07.709401 949939 usertrap_amd64.go:225] [ 49265: 49265] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:07.716437 949939 task_exit.go:204] [ 49265: 49265] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.716671 949939 task_exit.go:204] [ 49265: 49265] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.716828 949939 task_signals.go:204] [ 49265: 49269] Signal 49265, PID: 49269, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.716963 949939 task_exit.go:204] [ 49265: 49269] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.717964 949939 task_signals.go:204] [ 49265: 49271] Signal 49265, PID: 49271, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.718792 949939 task_exit.go:204] [ 49265: 49269] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.718842 949939 task_exit.go:204] [ 49265: 49269] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.719056 949939 task_exit.go:204] [ 49265: 49271] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.725294 949939 task_exit.go:204] [ 49265: 49271] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.725419 949939 task_exit.go:204] [ 49265: 49271] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.725546 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:07.726056 949939 task_exit.go:204] [ 49265: 49265] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.737680 949939 usertrap_amd64.go:212] [ 49272: 49272] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:07.737819 949939 usertrap_amd64.go:122] [ 49272: 49272] Allocate a new trap: 0xc001a6edb0 40 D0620 03:41:07.738458 949939 usertrap_amd64.go:225] [ 49272: 49272] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:07.741686 949939 usertrap_amd64.go:212] [ 49272: 49272] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:07.741761 949939 usertrap_amd64.go:122] [ 49272: 49272] Allocate a new trap: 0xc001a6edb0 41 D0620 03:41:07.741842 949939 usertrap_amd64.go:225] [ 49272: 49272] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:07.782817 949939 usertrap_amd64.go:212] [ 49272: 49272] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:07.782942 949939 usertrap_amd64.go:122] [ 49272: 49272] Allocate a new trap: 0xc001a6edb0 42 D0620 03:41:07.783036 949939 usertrap_amd64.go:225] [ 49272: 49272] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:07.797015 949939 usertrap_amd64.go:212] [ 49272: 49272] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:07.797127 949939 usertrap_amd64.go:122] [ 49272: 49272] Allocate a new trap: 0xc001a6edb0 43 D0620 03:41:07.797245 949939 usertrap_amd64.go:225] [ 49272: 49272] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:07.800054 949939 usertrap_amd64.go:212] [ 49272: 49272] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:07.800142 949939 usertrap_amd64.go:122] [ 49272: 49272] Allocate a new trap: 0xc001a6edb0 44 D0620 03:41:07.800231 949939 usertrap_amd64.go:225] [ 49272: 49272] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:07.804457 949939 task_exit.go:204] [ 49272: 49272] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.804623 949939 task_signals.go:204] [ 49272: 49274] Signal 49272, PID: 49274, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.804754 949939 task_exit.go:204] [ 49272: 49274] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.805069 949939 task_exit.go:204] [ 49272: 49274] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.805152 949939 task_exit.go:204] [ 49272: 49274] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.805272 949939 task_signals.go:204] [ 49272: 49273] Signal 49272, PID: 49273, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.805343 949939 task_exit.go:204] [ 49272: 49272] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.805437 949939 task_exit.go:204] [ 49272: 49273] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.812918 949939 task_exit.go:204] [ 49272: 49273] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.813082 949939 task_exit.go:204] [ 49272: 49273] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.813196 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:07.813326 949939 task_exit.go:204] [ 49272: 49272] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.833769 949939 usertrap_amd64.go:212] [ 49243: 49243] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:07.833870 949939 usertrap_amd64.go:122] [ 49243: 49243] Allocate a new trap: 0xc0066f2750 45 D0620 03:41:07.833969 949939 usertrap_amd64.go:225] [ 49243: 49243] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:41:07.840090 949939 task_exit.go:204] [ 49243: 49243] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.840364 949939 task_exit.go:204] [ 49243: 49243] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.840505 949939 task_signals.go:204] [ 49243: 49248] Signal 49243, PID: 49248, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.840863 949939 task_exit.go:204] [ 49243: 49248] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.841329 949939 task_exit.go:204] [ 49243: 49248] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.841552 949939 task_exit.go:204] [ 49243: 49248] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.840570 949939 task_signals.go:204] [ 49243: 49251] Signal 49243, PID: 49251, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.840683 949939 task_signals.go:204] [ 49243: 49254] Signal 49243, PID: 49254, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.840756 949939 task_signals.go:204] [ 49243: 49253] Signal 49243, PID: 49253, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.841989 949939 task_exit.go:204] [ 49243: 49251] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.842221 949939 task_exit.go:204] [ 49243: 49253] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.842383 949939 task_exit.go:204] [ 49243: 49253] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.842415 949939 task_exit.go:204] [ 49243: 49253] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.842596 949939 task_exit.go:204] [ 49243: 49251] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.842629 949939 task_exit.go:204] [ 49243: 49251] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.842733 949939 task_exit.go:204] [ 49243: 49254] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.855386 949939 task_exit.go:204] [ 49243: 49254] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.855537 949939 task_exit.go:204] [ 49243: 49254] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.855659 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:07.855744 949939 task_exit.go:204] [ 49243: 49243] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:07 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xf7ffffffffffffff}) (async, rerun: 32) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (rerun: 32) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) 03:41:07 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0x1}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') setrlimit(0x6, &(0x7f00000000c0)={0x9, 0x7}) 03:41:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x80800) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r4, 0x942e, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r6, 0x5450, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00', 0x783}, 0x1c) bind$inet6(r5, &(0x7f0000000500)={0xa, 0x2, 0x0, @private1}, 0x1c) listen(r5, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000240)) r7 = accept4$inet(r5, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x40802, 0x0) connect$inet(r8, &(0x7f0000000180)={0x2, 0x4e20, @empty}, 0x10) 03:41:07 executing program 3: setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) r0 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) dup2(r0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180), &(0x7f0000000240)='system_u:object_r:sshd_var_run_t:s0\x00', 0x24, 0x2) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x4040942c, &(0x7f0000000140)={0x0, 0x0, [0xffffffffffffffff, 0x3, 0x8, 0x0, 0x0, 0xf84c]}) D0620 03:41:07.894806 949939 usertrap_amd64.go:212] [ 49275: 49275] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:07.894924 949939 usertrap_amd64.go:122] [ 49275: 49275] Allocate a new trap: 0xc001a6ef00 40 D0620 03:41:07.895683 949939 usertrap_amd64.go:225] [ 49275: 49275] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:07.904242 949939 usertrap_amd64.go:212] [ 49276: 49276] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:07.904380 949939 usertrap_amd64.go:122] [ 49276: 49276] Allocate a new trap: 0xc002b2e6f0 40 D0620 03:41:07.905125 949939 usertrap_amd64.go:225] [ 49276: 49276] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:07.917301 949939 usertrap_amd64.go:212] [ 49275: 49275] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:07.917396 949939 usertrap_amd64.go:122] [ 49275: 49275] Allocate a new trap: 0xc001a6ef00 41 D0620 03:41:07.917480 949939 usertrap_amd64.go:225] [ 49275: 49275] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:07.921219 949939 usertrap_amd64.go:212] [ 49276: 49276] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:07.921297 949939 usertrap_amd64.go:122] [ 49276: 49276] Allocate a new trap: 0xc002b2e6f0 41 D0620 03:41:07.921384 949939 usertrap_amd64.go:225] [ 49276: 49276] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:07.954113 949939 usertrap_amd64.go:212] [ 49276: 49276] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:07.954226 949939 usertrap_amd64.go:122] [ 49276: 49276] Allocate a new trap: 0xc002b2e6f0 42 D0620 03:41:07.954344 949939 usertrap_amd64.go:225] [ 49276: 49276] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:07.955085 949939 usertrap_amd64.go:212] [ 49278: 49278] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:07.955312 949939 usertrap_amd64.go:122] [ 49278: 49278] Allocate a new trap: 0xc0066f2840 40 D0620 03:41:07.956027 949939 usertrap_amd64.go:225] [ 49278: 49278] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:07.961736 949939 usertrap_amd64.go:212] [ 49277: 49277] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:07.961958 949939 usertrap_amd64.go:122] [ 49277: 49277] Allocate a new trap: 0xc01f00f110 40 D0620 03:41:07.963162 949939 usertrap_amd64.go:225] [ 49277: 49277] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:07.965841 949939 usertrap_amd64.go:212] [ 49278: 49278] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:07.965913 949939 usertrap_amd64.go:122] [ 49278: 49278] Allocate a new trap: 0xc0066f2840 41 D0620 03:41:07.965977 949939 usertrap_amd64.go:225] [ 49278: 49278] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:07.968146 949939 task_signals.go:470] [ 49276: 49279] Notified of signal 25 D0620 03:41:07.968291 949939 usertrap_amd64.go:212] [ 49275: 49275] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:07.968321 949939 task_signals.go:204] [ 49276: 49279] Signal 49276, PID: 49279, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:07.968363 949939 usertrap_amd64.go:122] [ 49275: 49275] Allocate a new trap: 0xc001a6ef00 42 D0620 03:41:07.968422 949939 task_exit.go:204] [ 49276: 49279] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.968436 949939 usertrap_amd64.go:225] [ 49275: 49275] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:07.968659 949939 task_exit.go:204] [ 49276: 49279] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.968672 949939 task_signals.go:204] [ 49276: 49276] Signal 49276, PID: 49276, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:07.968732 949939 task_exit.go:204] [ 49276: 49279] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:07.968915 949939 task_exit.go:204] [ 49276: 49276] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:07.975113 949939 task_exit.go:204] [ 49276: 49276] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:07.975235 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:07.976242 949939 task_exit.go:204] [ 49276: 49276] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:07 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0x1}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async, rerun: 64) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') (async) setrlimit(0x6, &(0x7f00000000c0)={0x9, 0x7}) D0620 03:41:07.985826 949939 usertrap_amd64.go:212] [ 49277: 49277] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:07.985910 949939 usertrap_amd64.go:122] [ 49277: 49277] Allocate a new trap: 0xc01f00f110 41 D0620 03:41:07.986034 949939 usertrap_amd64.go:225] [ 49277: 49277] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:08.005359 949939 usertrap_amd64.go:212] [ 49275: 49275] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:08.006782 949939 usertrap_amd64.go:122] [ 49275: 49275] Allocate a new trap: 0xc001a6ef00 43 D0620 03:41:08.007023 949939 usertrap_amd64.go:225] [ 49275: 49275] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:08.007516 949939 usertrap_amd64.go:212] [ 49278: 49278] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:08.009025 949939 usertrap_amd64.go:122] [ 49278: 49278] Allocate a new trap: 0xc0066f2840 42 D0620 03:41:08.009423 949939 usertrap_amd64.go:225] [ 49278: 49278] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:08.015267 949939 usertrap_amd64.go:212] [ 49281: 49281] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:08.015418 949939 usertrap_amd64.go:122] [ 49281: 49281] Allocate a new trap: 0xc009a00f90 40 D0620 03:41:08.015971 949939 usertrap_amd64.go:225] [ 49281: 49281] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:08.026169 949939 task_exit.go:204] [ 49275: 49275] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.026351 949939 task_signals.go:204] [ 49275: 49280] Signal 49275, PID: 49280, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.026487 949939 task_exit.go:204] [ 49275: 49280] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.026700 949939 task_exit.go:204] [ 49275: 49275] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.027769 949939 task_signals.go:470] [ 49278: 49283] Notified of signal 25 D0620 03:41:08.027988 949939 task_signals.go:204] [ 49278: 49283] Signal 49278, PID: 49283, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:08.028149 949939 task_exit.go:204] [ 49278: 49283] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.028468 949939 task_signals.go:204] [ 49278: 49282] Signal 49278, PID: 49282, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.028595 949939 task_exit.go:204] [ 49278: 49283] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.028825 949939 task_exit.go:204] [ 49278: 49283] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.029096 949939 task_exit.go:204] [ 49278: 49282] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.030203 949939 task_signals.go:204] [ 49278: 49278] Signal 49278, PID: 49278, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.031100 949939 task_exit.go:204] [ 49278: 49282] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.031176 949939 task_exit.go:204] [ 49278: 49282] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.031680 949939 task_exit.go:204] [ 49278: 49278] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.032037 949939 task_exit.go:204] [ 49275: 49280] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.032207 949939 task_exit.go:204] [ 49275: 49280] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.033790 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:08.034118 949939 task_exit.go:204] [ 49275: 49275] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.036629 949939 usertrap_amd64.go:212] [ 49281: 49281] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:08.036801 949939 usertrap_amd64.go:122] [ 49281: 49281] Allocate a new trap: 0xc009a00f90 41 D0620 03:41:08.036924 949939 usertrap_amd64.go:225] [ 49281: 49281] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) 03:41:08 executing program 3: setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async, rerun: 32) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) (async, rerun: 32) r0 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) (async) dup2(r0, 0xffffffffffffffff) (async) lsetxattr$security_selinux(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180), &(0x7f0000000240)='system_u:object_r:sshd_var_run_t:s0\x00', 0x24, 0x2) (async) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x4040942c, &(0x7f0000000140)={0x0, 0x0, [0xffffffffffffffff, 0x3, 0x8, 0x0, 0x0, 0xf84c]}) D0620 03:41:08.037547 949939 task_exit.go:204] [ 49278: 49278] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.037881 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:08.038125 949939 task_exit.go:204] [ 49278: 49278] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:08 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xf7ffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xf7ffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) (async) D0620 03:41:08.063407 949939 usertrap_amd64.go:212] [ 49277: 49277] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:08.063537 949939 usertrap_amd64.go:122] [ 49277: 49277] Allocate a new trap: 0xc01f00f110 42 D0620 03:41:08.063615 949939 usertrap_amd64.go:225] [ 49277: 49277] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:08.085635 949939 usertrap_amd64.go:212] [ 49277: 49284] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:41:08.085753 949939 usertrap_amd64.go:122] [ 49277: 49284] Allocate a new trap: 0xc01f00f110 43 D0620 03:41:08.085836 949939 usertrap_amd64.go:225] [ 49277: 49284] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:08.096496 949939 usertrap_amd64.go:212] [ 49286: 49286] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:08.097968 949939 usertrap_amd64.go:212] [ 49281: 49281] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:08.098034 949939 usertrap_amd64.go:122] [ 49281: 49281] Allocate a new trap: 0xc009a00f90 42 D0620 03:41:08.098116 949939 usertrap_amd64.go:225] [ 49281: 49281] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:08.098192 949939 usertrap_amd64.go:122] [ 49286: 49286] Allocate a new trap: 0xc002380480 40 D0620 03:41:08.101645 949939 usertrap_amd64.go:225] [ 49286: 49286] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:08.102396 949939 usertrap_amd64.go:212] [ 49285: 49285] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:08.102500 949939 usertrap_amd64.go:122] [ 49285: 49285] Allocate a new trap: 0xc01f00f2c0 40 D0620 03:41:08.103102 949939 usertrap_amd64.go:225] [ 49285: 49285] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:08.107533 949939 task_signals.go:470] [ 49281: 49288] Notified of signal 25 D0620 03:41:08.107662 949939 task_signals.go:204] [ 49281: 49288] Signal 49281, PID: 49288, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:08.107918 949939 task_exit.go:204] [ 49281: 49288] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.108080 949939 task_exit.go:204] [ 49281: 49288] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.108061 949939 task_signals.go:204] [ 49281: 49281] Signal 49281, PID: 49281, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.108109 949939 task_exit.go:204] [ 49281: 49288] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.108364 949939 usertrap_amd64.go:212] [ 49285: 49285] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:08.108420 949939 usertrap_amd64.go:122] [ 49285: 49285] Allocate a new trap: 0xc01f00f2c0 41 D0620 03:41:08.108517 949939 task_signals.go:204] [ 49281: 49287] Signal 49281, PID: 49287, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.108667 949939 task_exit.go:204] [ 49281: 49287] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.108531 949939 usertrap_amd64.go:225] [ 49285: 49285] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:08.108810 949939 task_exit.go:204] [ 49281: 49281] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.110323 949939 task_exit.go:204] [ 49281: 49281] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.117281 949939 usertrap_amd64.go:212] [ 49286: 49286] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:08.117631 949939 usertrap_amd64.go:122] [ 49286: 49286] Allocate a new trap: 0xc002380480 41 D0620 03:41:08.118284 949939 usertrap_amd64.go:225] [ 49286: 49286] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:08.118302 949939 task_exit.go:204] [ 49281: 49287] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.118726 949939 task_exit.go:204] [ 49281: 49287] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.118916 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:08.119206 949939 task_exit.go:204] [ 49281: 49281] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:08 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0x1}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') setrlimit(0x6, &(0x7f00000000c0)={0x9, 0x7}) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0x1}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) setrlimit(0x6, &(0x7f00000000c0)={0x9, 0x7}) (async) D0620 03:41:08.147899 949939 usertrap_amd64.go:212] [ 49285: 49285] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:08.148008 949939 usertrap_amd64.go:122] [ 49285: 49285] Allocate a new trap: 0xc01f00f2c0 42 D0620 03:41:08.148215 949939 usertrap_amd64.go:225] [ 49285: 49285] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:08.170556 949939 usertrap_amd64.go:212] [ 49285: 49285] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:08.170792 949939 usertrap_amd64.go:122] [ 49285: 49285] Allocate a new trap: 0xc01f00f2c0 43 D0620 03:41:08.170963 949939 usertrap_amd64.go:225] [ 49285: 49285] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:08.181968 949939 usertrap_amd64.go:212] [ 49285: 49285] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:08.182166 949939 usertrap_amd64.go:122] [ 49285: 49285] Allocate a new trap: 0xc01f00f2c0 44 D0620 03:41:08.182349 949939 usertrap_amd64.go:225] [ 49285: 49285] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:08.185745 949939 usertrap_amd64.go:212] [ 49286: 49286] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:08.185802 949939 usertrap_amd64.go:122] [ 49286: 49286] Allocate a new trap: 0xc002380480 42 D0620 03:41:08.185872 949939 usertrap_amd64.go:225] [ 49286: 49286] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:08.191433 949939 usertrap_amd64.go:212] [ 49277: 49277] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:08.191547 949939 usertrap_amd64.go:122] [ 49277: 49277] Allocate a new trap: 0xc01f00f110 44 D0620 03:41:08.191613 949939 usertrap_amd64.go:225] [ 49277: 49277] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:08.192663 949939 usertrap_amd64.go:212] [ 49289: 49289] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:08.192811 949939 usertrap_amd64.go:122] [ 49289: 49289] Allocate a new trap: 0xc0066f2b40 40 D0620 03:41:08.193528 949939 usertrap_amd64.go:225] [ 49289: 49289] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:08.205748 949939 task_signals.go:470] [ 49286: 49295] Notified of signal 25 D0620 03:41:08.205918 949939 task_signals.go:204] [ 49286: 49295] Signal 49286, PID: 49295, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:08.206002 949939 task_exit.go:204] [ 49286: 49295] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.206184 949939 task_exit.go:204] [ 49286: 49295] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.206227 949939 task_exit.go:204] [ 49286: 49295] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.206400 949939 task_signals.go:204] [ 49286: 49286] Signal 49286, PID: 49286, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.206524 949939 task_exit.go:204] [ 49286: 49286] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.211017 949939 task_exit.go:204] [ 49286: 49286] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.211378 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:08.212013 949939 usertrap_amd64.go:212] [ 49289: 49289] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:08.212743 949939 usertrap_amd64.go:122] [ 49289: 49289] Allocate a new trap: 0xc0066f2b40 41 D0620 03:41:08.212874 949939 usertrap_amd64.go:225] [ 49289: 49289] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:08.213718 949939 task_exit.go:204] [ 49286: 49286] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.213917 949939 task_exit.go:204] [ 49285: 49285] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.214260 949939 task_signals.go:204] [ 49285: 49291] Signal 49285, PID: 49291, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.214273 949939 task_signals.go:204] [ 49285: 49293] Signal 49285, PID: 49293, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.214480 949939 task_signals.go:204] [ 49285: 49290] Signal 49285, PID: 49290, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.214522 949939 task_signals.go:204] [ 49285: 49292] Signal 49285, PID: 49292, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.214623 949939 task_exit.go:204] [ 49285: 49285] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.214769 949939 task_exit.go:204] [ 49285: 49291] Transitioning from exit state TaskExitNone to TaskExitInitiated 03:41:08 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x7ffffeffffffffff) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)=@random={'btrfs.', '\x00'}, &(0x7f0000000180)='/\x00', 0x2, 0x1) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:08.215090 949939 task_exit.go:204] [ 49285: 49291] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.215146 949939 task_exit.go:204] [ 49285: 49291] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.215326 949939 task_exit.go:204] [ 49285: 49293] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.215564 949939 task_exit.go:204] [ 49285: 49293] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.215623 949939 task_exit.go:204] [ 49285: 49293] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.215754 949939 task_exit.go:204] [ 49285: 49290] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.216249 949939 task_exit.go:204] [ 49285: 49292] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.216621 949939 task_exit.go:204] [ 49285: 49290] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.216688 949939 task_exit.go:204] [ 49285: 49290] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.222511 949939 task_exit.go:204] [ 49285: 49292] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.222599 949939 task_exit.go:204] [ 49285: 49292] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.222695 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:08.223072 949939 task_exit.go:204] [ 49285: 49285] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.286293 949939 usertrap_amd64.go:212] [ 49289: 49289] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:08.286395 949939 usertrap_amd64.go:122] [ 49289: 49289] Allocate a new trap: 0xc0066f2b40 42 D0620 03:41:08.286514 949939 usertrap_amd64.go:225] [ 49289: 49289] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:08.293493 949939 usertrap_amd64.go:212] [ 49296: 49296] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:08.293661 949939 usertrap_amd64.go:122] [ 49296: 49296] Allocate a new trap: 0xc01f00f650 40 D0620 03:41:08.295050 949939 usertrap_amd64.go:225] [ 49296: 49296] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:08.301575 949939 task_signals.go:470] [ 49289: 49297] Notified of signal 25 D0620 03:41:08.301747 949939 task_signals.go:204] [ 49289: 49297] Signal 49289, PID: 49297, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:08.301834 949939 task_exit.go:204] [ 49289: 49297] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.302016 949939 task_exit.go:204] [ 49289: 49297] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.302044 949939 task_exit.go:204] [ 49289: 49297] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.302458 949939 task_signals.go:204] [ 49289: 49289] Signal 49289, PID: 49289, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:08.302555 949939 task_exit.go:204] [ 49289: 49289] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:08.307907 949939 task_exit.go:204] [ 49289: 49289] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:08.308015 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:08.308314 949939 task_exit.go:204] [ 49289: 49289] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:08.316133 949939 usertrap_amd64.go:212] [ 49296: 49296] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:08.316459 949939 usertrap_amd64.go:122] [ 49296: 49296] Allocate a new trap: 0xc01f00f650 41 D0620 03:41:08.316686 949939 usertrap_amd64.go:225] [ 49296: 49296] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:08.353269 949939 usertrap_amd64.go:212] [ 49296: 49296] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:08.353394 949939 usertrap_amd64.go:122] [ 49296: 49296] Allocate a new trap: 0xc01f00f650 42 D0620 03:41:08.353501 949939 usertrap_amd64.go:225] [ 49296: 49296] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:10.032037 949939 usertrap_amd64.go:212] [ 49277: 49277] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:10.032290 949939 usertrap_amd64.go:122] [ 49277: 49277] Allocate a new trap: 0xc01f00f110 45 D0620 03:41:10.032705 949939 usertrap_amd64.go:225] [ 49277: 49277] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:41:10.040534 949939 task_exit.go:204] [ 49277: 49277] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:10.041263 949939 task_signals.go:204] [ 49277: 49294] Signal 49277, PID: 49294, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:10.041544 949939 task_signals.go:204] [ 49277: 49284] Signal 49277, PID: 49284, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:10.041614 949939 task_exit.go:204] [ 49277: 49294] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:10.047507 949939 task_exit.go:204] [ 49277: 49284] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:10.047942 949939 task_exit.go:204] [ 49277: 49277] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:10.048105 949939 task_exit.go:204] [ 49277: 49294] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:10.048195 949939 task_exit.go:204] [ 49277: 49294] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:11.033263 949939 task_signals.go:481] [ 49277: 49277] No task notified of signal 9 D0620 03:41:11.033489 949939 task_signals.go:458] [ 49277: 49277] Discarding duplicate signal 9 D0620 03:41:11.261570 949939 task_signals.go:481] [ 49296: 49296] No task notified of signal 9 D0620 03:41:11.261824 949939 task_signals.go:458] [ 49296: 49296] Discarding duplicate signal 9 D0620 03:41:13.810051 949939 task_signals.go:470] [ 7: 4631] Notified of signal 23 D0620 03:41:13.811028 949939 task_signals.go:220] [ 7: 4631] Signal 23: delivering to handler D0620 03:41:17.556975 949939 task_signals.go:204] [ 49296: 49296] Signal 49296, PID: 49296, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:17.557182 949939 task_exit.go:204] [ 49296: 49296] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:17.557455 949939 task_exit.go:204] [ 49296: 49296] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:17.562077 949939 task_exit.go:204] [ 49277: 49284] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:17.562263 949939 task_exit.go:204] [ 49277: 49284] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:17.562395 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:17.562722 949939 task_exit.go:204] [ 49277: 49277] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:17 executing program 3: setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x21d42a8a) (async, rerun: 64) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x2) (async, rerun: 64) r0 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (rerun: 64) ioctl$FIONCLEX(r0, 0x5450) (async) dup2(r0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180), &(0x7f0000000240)='system_u:object_r:sshd_var_run_t:s0\x00', 0x24, 0x2) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x4040942c, &(0x7f0000000140)={0x0, 0x0, [0xffffffffffffffff, 0x3, 0x8, 0x0, 0x0, 0xf84c]}) 03:41:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) ioctl$FIONCLEX(r2, 0x5450) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) (async) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x4) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x80800) (async) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x80800) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r4, 0x942e, 0x0) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r4, 0x942e, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) (async) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r6, 0x5450, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00', 0x783}, 0x1c) bind$inet6(r5, &(0x7f0000000500)={0xa, 0x2, 0x0, @private1}, 0x1c) listen(r5, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000240)) r7 = accept4$inet(r5, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x40802, 0x0) connect$inet(r8, &(0x7f0000000180)={0x2, 0x4e20, @empty}, 0x10) 03:41:17 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0xc5, 0x4, 0x9, "a71556e02da2d0b02677e0b0929180b9", "8958897304ae44435450f461914dfc7461001cd023a2054fc97fd932a094e25f861c0d2b48fcc5a3922bf1991b4685272f7f82f096f9fd66bbf3565db8f8b20469e84dbe747c638696bb10f022ba94103be544602ab3fd33acbfb5ffa59ed48bc8584176b66e3998b25f7259a853765048ef7694de6aea2e7a6115f6c22611e05b2b17043bd4b032d5a5cc2cac6bb34cf38fefba14677e7405fc47516cfb0d3b1288554cbd699c1ff90df4de82ee0d6e"}, 0xc5, 0x2) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:17.625257 949939 usertrap_amd64.go:212] [ 49299: 49299] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:17.625472 949939 usertrap_amd64.go:122] [ 49299: 49299] Allocate a new trap: 0xc001a6e150 40 D0620 03:41:17.626307 949939 usertrap_amd64.go:225] [ 49299: 49299] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:17.634309 949939 usertrap_amd64.go:212] [ 49300: 49300] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:17.635458 949939 usertrap_amd64.go:212] [ 49299: 49299] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:17.635558 949939 usertrap_amd64.go:122] [ 49299: 49299] Allocate a new trap: 0xc001a6e150 41 D0620 03:41:17.635738 949939 usertrap_amd64.go:225] [ 49299: 49299] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:17.635969 949939 usertrap_amd64.go:122] [ 49300: 49300] Allocate a new trap: 0xc00945e1b0 40 D0620 03:41:17.637010 949939 usertrap_amd64.go:225] [ 49300: 49300] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:17.640144 949939 usertrap_amd64.go:212] [ 49300: 49300] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:17.640385 949939 usertrap_amd64.go:122] [ 49300: 49300] Allocate a new trap: 0xc00945e1b0 41 D0620 03:41:17.640578 949939 usertrap_amd64.go:225] [ 49300: 49300] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:17.658856 949939 usertrap_amd64.go:212] [ 49301: 49301] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:17.659082 949939 usertrap_amd64.go:122] [ 49301: 49301] Allocate a new trap: 0xc0021b4000 40 D0620 03:41:17.660187 949939 usertrap_amd64.go:225] [ 49301: 49301] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:17.672538 949939 usertrap_amd64.go:212] [ 49301: 49301] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:17.672683 949939 usertrap_amd64.go:122] [ 49301: 49301] Allocate a new trap: 0xc0021b4000 41 D0620 03:41:17.672817 949939 usertrap_amd64.go:225] [ 49301: 49301] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:17.678002 949939 usertrap_amd64.go:212] [ 49299: 49299] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:17.678146 949939 usertrap_amd64.go:122] [ 49299: 49299] Allocate a new trap: 0xc001a6e150 42 D0620 03:41:17.678259 949939 usertrap_amd64.go:225] [ 49299: 49299] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:17.691000 949939 usertrap_amd64.go:212] [ 49300: 49300] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:17.691245 949939 usertrap_amd64.go:122] [ 49300: 49300] Allocate a new trap: 0xc00945e1b0 42 D0620 03:41:17.691465 949939 usertrap_amd64.go:225] [ 49300: 49300] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:17.716993 949939 usertrap_amd64.go:212] [ 49301: 49301] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:17.717149 949939 usertrap_amd64.go:122] [ 49301: 49301] Allocate a new trap: 0xc0021b4000 42 D0620 03:41:17.717263 949939 usertrap_amd64.go:225] [ 49301: 49301] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:17.731833 949939 usertrap_amd64.go:212] [ 49301: 49307] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:41:17.732029 949939 usertrap_amd64.go:122] [ 49301: 49307] Allocate a new trap: 0xc0021b4000 43 D0620 03:41:17.732230 949939 usertrap_amd64.go:225] [ 49301: 49307] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:17.781224 949939 usertrap_amd64.go:212] [ 49299: 49299] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:17.781422 949939 usertrap_amd64.go:122] [ 49299: 49299] Allocate a new trap: 0xc001a6e150 43 D0620 03:41:17.781589 949939 usertrap_amd64.go:225] [ 49299: 49299] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:17.873228 949939 usertrap_amd64.go:212] [ 49301: 49301] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:17.873454 949939 usertrap_amd64.go:122] [ 49301: 49301] Allocate a new trap: 0xc0021b4000 44 D0620 03:41:17.873676 949939 usertrap_amd64.go:225] [ 49301: 49301] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:17.945576 949939 usertrap_amd64.go:212] [ 49300: 49300] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:17.945718 949939 usertrap_amd64.go:122] [ 49300: 49300] Allocate a new trap: 0xc00945e1b0 43 D0620 03:41:17.945788 949939 usertrap_amd64.go:225] [ 49300: 49300] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:18.297619 949939 usertrap_amd64.go:212] [ 49300: 49300] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:18.297759 949939 usertrap_amd64.go:122] [ 49300: 49300] Allocate a new trap: 0xc00945e1b0 44 D0620 03:41:18.297852 949939 usertrap_amd64.go:225] [ 49300: 49300] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:23.599731 949939 task_exit.go:204] [ 49300: 49300] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.600239 949939 task_exit.go:204] [ 49300: 49300] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.600690 949939 task_signals.go:204] [ 49300: 49311] Signal 49300, PID: 49311, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.601256 949939 task_exit.go:204] [ 49300: 49311] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.601334 949939 usertrap_amd64.go:212] [ 49301: 49301] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:23.609098 949939 usertrap_amd64.go:122] [ 49301: 49301] Allocate a new trap: 0xc0021b4000 45 D0620 03:41:23.607086 949939 task_signals.go:204] [ 49300: 49305] Signal 49300, PID: 49305, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.611835 949939 task_signals.go:204] [ 49300: 49310] Signal 49300, PID: 49310, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.613004 949939 usertrap_amd64.go:225] [ 49301: 49301] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:41:23.608628 949939 usertrap_amd64.go:212] [ 49299: 49299] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:23.631203 949939 usertrap_amd64.go:122] [ 49299: 49299] Allocate a new trap: 0xc001a6e150 44 D0620 03:41:23.607698 949939 task_signals.go:476] [ 49301: 49307] Notified of group signal 9 D0620 03:41:23.635101 949939 task_exit.go:204] [ 49300: 49311] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.635108 949939 usertrap_amd64.go:225] [ 49299: 49299] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:23.635222 949939 task_exit.go:204] [ 49300: 49311] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.638802 949939 task_signals.go:204] [ 49301: 49307] Signal 49301, PID: 49307, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.636082 949939 task_signals.go:458] [ 49301: 49301] Discarding duplicate signal 9 D0620 03:41:23.655710 949939 task_exit.go:204] [ 49300: 49305] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.656039 949939 task_signals.go:204] [ 49301: 49309] Signal 49301, PID: 49309, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.656233 949939 task_signals.go:481] [ 49299: 49299] No task notified of signal 9 D0620 03:41:23.656432 949939 task_signals.go:458] [ 49299: 49299] Discarding duplicate signal 9 D0620 03:41:23.656576 949939 task_signals.go:204] [ 49300: 49312] Signal 49300, PID: 49312, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.656753 949939 task_signals.go:204] [ 49299: 49306] Signal 49299, PID: 49306, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.660070 949939 task_signals.go:481] [ 49300: 49300] No task notified of signal 9 D0620 03:41:23.664534 949939 task_signals.go:458] [ 49300: 49300] Discarding duplicate signal 9 D0620 03:41:23.664766 949939 task_signals.go:204] [ 49299: 49302] Signal 49299, PID: 49302, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.666531 949939 task_signals.go:204] [ 49301: 49308] Signal 49301, PID: 49308, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.666717 949939 task_exit.go:204] [ 49300: 49310] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.666815 949939 task_signals.go:204] [ 49299: 49304] Signal 49299, PID: 49304, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.667022 949939 task_exit.go:204] [ 49299: 49299] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.667129 949939 task_signals.go:204] [ 49299: 49303] Signal 49299, PID: 49303, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:23.766642 949939 task_exit.go:204] [ 49300: 49312] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.770166 949939 task_exit.go:204] [ 49299: 49306] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.770439 949939 task_exit.go:204] [ 49299: 49302] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.771064 949939 task_exit.go:204] [ 49299: 49304] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.775973 949939 task_exit.go:204] [ 49299: 49303] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.776327 949939 task_exit.go:204] [ 49300: 49305] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.776383 949939 task_exit.go:204] [ 49300: 49305] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.776571 949939 task_exit.go:204] [ 49299: 49304] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.776672 949939 task_exit.go:204] [ 49299: 49304] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.776823 949939 task_exit.go:204] [ 49300: 49310] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.777064 949939 task_exit.go:204] [ 49300: 49310] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.777507 949939 task_exit.go:204] [ 49299: 49303] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.777726 949939 task_exit.go:204] [ 49299: 49303] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.778234 949939 task_exit.go:204] [ 49299: 49299] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.789283 949939 task_exit.go:204] [ 49299: 49306] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.789413 949939 task_exit.go:204] [ 49299: 49306] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.795820 949939 task_exit.go:204] [ 49300: 49312] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.795948 949939 task_exit.go:204] [ 49300: 49312] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.796069 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:23.797275 949939 task_exit.go:204] [ 49300: 49300] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.812781 949939 task_exit.go:204] [ 49299: 49302] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.812922 949939 task_exit.go:204] [ 49299: 49302] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.829874 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:23.830111 949939 task_signals.go:204] [ 49301: 49301] Signal 49301, PID: 49301, TID: 0, fault addr: 0x9: terminating thread group 03:41:23 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0xc5, 0x4, 0x9, "a71556e02da2d0b02677e0b0929180b9", "8958897304ae44435450f461914dfc7461001cd023a2054fc97fd932a094e25f861c0d2b48fcc5a3922bf1991b4685272f7f82f096f9fd66bbf3565db8f8b20469e84dbe747c638696bb10f022ba94103be544602ab3fd33acbfb5ffa59ed48bc8584176b66e3998b25f7259a853765048ef7694de6aea2e7a6115f6c22611e05b2b17043bd4b032d5a5cc2cac6bb34cf38fefba14677e7405fc47516cfb0d3b1288554cbd699c1ff90df4de82ee0d6e"}, 0xc5, 0x2) chdir(&(0x7f0000000040)='./file0\x00') D0620 03:41:23.834687 949939 task_exit.go:204] [ 49301: 49308] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.851685 949939 task_exit.go:204] [ 49301: 49308] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.851756 949939 task_exit.go:204] [ 49301: 49308] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.851957 949939 task_exit.go:204] [ 49301: 49301] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.852234 949939 task_exit.go:204] [ 49301: 49301] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.852406 949939 task_exit.go:204] [ 49301: 49309] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:23.852645 949939 task_exit.go:204] [ 49301: 49309] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:23.852703 949939 task_exit.go:204] [ 49301: 49309] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:23.852850 949939 task_exit.go:204] [ 49299: 49299] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:23 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000140)='./file0/file1\x00', 0xcf1cd5b868985a2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000180)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f00000001c0)) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) D0620 03:41:23.993164 949939 task_exit.go:204] [ 49301: 49307] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:24.059933 949939 task_exit.go:204] [ 49301: 49307] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:24.060231 949939 task_exit.go:204] [ 49301: 49307] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:24.060629 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:24.082300 949939 task_exit.go:204] [ 49301: 49301] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) (async) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) (async) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x4) (async) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x80800) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r4, 0x942e, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$TCSETAW(r6, 0x5450, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00', 0x783}, 0x1c) (async) bind$inet6(r5, &(0x7f0000000500)={0xa, 0x2, 0x0, @private1}, 0x1c) listen(r5, 0x0) (async) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000240)) (async) r7 = accept4$inet(r5, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x40802, 0x0) connect$inet(r8, &(0x7f0000000180)={0x2, 0x4e20, @empty}, 0x10) D0620 03:41:24.376203 949939 usertrap_amd64.go:212] [ 49313: 49313] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:24.376450 949939 usertrap_amd64.go:122] [ 49313: 49313] Allocate a new trap: 0xc000a70090 40 D0620 03:41:24.387227 949939 usertrap_amd64.go:225] [ 49313: 49313] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:24.402651 949939 usertrap_amd64.go:212] [ 49313: 49313] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:24.402756 949939 usertrap_amd64.go:122] [ 49313: 49313] Allocate a new trap: 0xc000a70090 41 D0620 03:41:24.402841 949939 usertrap_amd64.go:225] [ 49313: 49313] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:24.560319 949939 usertrap_amd64.go:212] [ 49314: 49314] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:24.560686 949939 usertrap_amd64.go:122] [ 49314: 49314] Allocate a new trap: 0xc000316870 40 D0620 03:41:24.581813 949939 usertrap_amd64.go:225] [ 49314: 49314] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:24.615139 949939 usertrap_amd64.go:212] [ 49314: 49314] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:24.615342 949939 usertrap_amd64.go:122] [ 49314: 49314] Allocate a new trap: 0xc000316870 41 D0620 03:41:24.615524 949939 usertrap_amd64.go:225] [ 49314: 49314] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:24.755427 949939 usertrap_amd64.go:212] [ 49313: 49313] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:24.755638 949939 usertrap_amd64.go:122] [ 49313: 49313] Allocate a new trap: 0xc000a70090 42 D0620 03:41:24.755789 949939 usertrap_amd64.go:225] [ 49313: 49313] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:24.762476 949939 usertrap_amd64.go:212] [ 49315: 49315] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:24.762812 949939 usertrap_amd64.go:122] [ 49315: 49315] Allocate a new trap: 0xc0029c8000 40 D0620 03:41:24.776590 949939 usertrap_amd64.go:225] [ 49315: 49315] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:24.793642 949939 usertrap_amd64.go:212] [ 49315: 49315] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:24.793894 949939 usertrap_amd64.go:122] [ 49315: 49315] Allocate a new trap: 0xc0029c8000 41 D0620 03:41:24.794004 949939 usertrap_amd64.go:225] [ 49315: 49315] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:24.893269 949939 usertrap_amd64.go:212] [ 49314: 49314] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:24.893483 949939 usertrap_amd64.go:122] [ 49314: 49314] Allocate a new trap: 0xc000316870 42 D0620 03:41:24.893669 949939 usertrap_amd64.go:225] [ 49314: 49314] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:24.914372 949939 usertrap_amd64.go:212] [ 49313: 49313] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:25.272898 949939 usertrap_amd64.go:122] [ 49313: 49313] Allocate a new trap: 0xc000a70090 43 D0620 03:41:25.326814 949939 usertrap_amd64.go:225] [ 49313: 49313] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:25.334487 949939 usertrap_amd64.go:212] [ 49313: 49313] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:25.339884 949939 usertrap_amd64.go:122] [ 49313: 49313] Allocate a new trap: 0xc000a70090 44 D0620 03:41:25.342749 949939 usertrap_amd64.go:225] [ 49313: 49313] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:25.779339 949939 task_exit.go:204] [ 49313: 49313] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:25.845245 949939 task_exit.go:204] [ 49313: 49313] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:25.836925 949939 usertrap_amd64.go:212] [ 49314: 49314] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:25.869775 949939 usertrap_amd64.go:122] [ 49314: 49314] Allocate a new trap: 0xc000316870 43 D0620 03:41:25.868516 949939 task_signals.go:204] [ 49313: 49316] Signal 49313, PID: 49316, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:25.872826 949939 task_exit.go:204] [ 49313: 49316] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:25.873130 949939 task_exit.go:204] [ 49313: 49316] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:25.873199 949939 task_exit.go:204] [ 49313: 49316] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:25.882570 949939 usertrap_amd64.go:225] [ 49314: 49314] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:25.914746 949939 task_exit.go:204] [ 49314: 49314] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:25.915454 949939 task_exit.go:204] [ 49314: 49314] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:25.871961 949939 task_signals.go:204] [ 49313: 49317] Signal 49313, PID: 49317, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:25.931476 949939 task_exit.go:204] [ 49313: 49317] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:25.929420 949939 task_signals.go:204] [ 49314: 49319] Signal 49314, PID: 49319, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:25.942015 949939 task_exit.go:204] [ 49314: 49319] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:25.942337 949939 task_exit.go:204] [ 49314: 49319] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:25.942406 949939 task_exit.go:204] [ 49314: 49319] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:25.929640 949939 task_signals.go:204] [ 49314: 49318] Signal 49314, PID: 49318, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:25.959469 949939 task_exit.go:204] [ 49314: 49318] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:25.977228 949939 task_exit.go:204] [ 49314: 49318] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:25.977446 949939 task_exit.go:204] [ 49314: 49318] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:25.982950 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:25.983341 949939 task_exit.go:204] [ 49314: 49314] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:26.026848 949939 task_exit.go:204] [ 49313: 49317] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:26.027879 949939 task_exit.go:204] [ 49313: 49317] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:26.028132 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:26.033044 949939 task_exit.go:204] [ 49313: 49313] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:26 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000140)='./file0/file1\x00', 0xcf1cd5b868985a2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000180)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f00000001c0)) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) mkdir(&(0x7f0000000140)='./file0/file1\x00', 0xcf1cd5b868985a2) (async) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000180)) (async) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f00000001c0)) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) D0620 03:41:26.218326 949939 usertrap_amd64.go:212] [ 49315: 49315] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:26.218429 949939 usertrap_amd64.go:122] [ 49315: 49315] Allocate a new trap: 0xc0029c8000 42 D0620 03:41:26.218521 949939 usertrap_amd64.go:225] [ 49315: 49315] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:26.447427 949939 usertrap_amd64.go:212] [ 49315: 49322] Found the pattern at ip 56111a6573fd:sysno 257 D0620 03:41:26.471478 949939 usertrap_amd64.go:122] [ 49315: 49322] Allocate a new trap: 0xc0029c8000 43 D0620 03:41:26.476550 949939 usertrap_amd64.go:225] [ 49315: 49322] Apply the binary patch addr 56111a6573fd trap addr 61d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:26.521233 949939 usertrap_amd64.go:212] [ 49321: 49321] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:26.521379 949939 usertrap_amd64.go:122] [ 49321: 49321] Allocate a new trap: 0xc00691a000 40 D0620 03:41:26.529495 949939 usertrap_amd64.go:225] [ 49321: 49321] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:26.552827 949939 usertrap_amd64.go:212] [ 49321: 49321] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:26.574245 949939 usertrap_amd64.go:122] [ 49321: 49321] Allocate a new trap: 0xc00691a000 41 D0620 03:41:26.574366 949939 usertrap_amd64.go:225] [ 49321: 49321] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:26.716878 949939 usertrap_amd64.go:212] [ 49315: 49315] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:26.717075 949939 usertrap_amd64.go:122] [ 49315: 49315] Allocate a new trap: 0xc0029c8000 44 D0620 03:41:26.740289 949939 usertrap_amd64.go:225] [ 49315: 49315] Apply the binary patch addr 56111a6ca0aa trap addr 61dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0620 03:41:26.803373 949939 usertrap_amd64.go:212] [ 49315: 49315] Found the pattern at ip 56111a657124:sysno 3 D0620 03:41:26.803568 949939 usertrap_amd64.go:122] [ 49315: 49315] Allocate a new trap: 0xc0029c8000 45 D0620 03:41:26.803859 949939 usertrap_amd64.go:225] [ 49315: 49315] Apply the binary patch addr 56111a657124 trap addr 61e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 30 6 0]) D0620 03:41:26.845225 949939 task_exit.go:204] [ 49315: 49315] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:26.845552 949939 task_exit.go:204] [ 49315: 49315] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:26.845783 949939 task_signals.go:204] [ 49315: 49323] Signal 49315, PID: 49323, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:26.845825 949939 task_signals.go:204] [ 49315: 49320] Signal 49315, PID: 49320, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:26.845876 949939 task_exit.go:204] [ 49315: 49323] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:26.845954 949939 task_exit.go:204] [ 49315: 49320] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:26.846173 949939 task_signals.go:204] [ 49315: 49322] Signal 49315, PID: 49322, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:26.846316 949939 task_exit.go:204] [ 49315: 49322] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:26.846409 949939 task_exit.go:204] [ 49315: 49323] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:26.846908 949939 task_exit.go:204] [ 49315: 49323] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:26.847151 949939 task_exit.go:204] [ 49315: 49320] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:26.847241 949939 task_exit.go:204] [ 49315: 49320] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:26.857770 949939 usertrap_amd64.go:212] [ 49321: 49321] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:26.857902 949939 usertrap_amd64.go:122] [ 49321: 49321] Allocate a new trap: 0xc00691a000 42 D0620 03:41:26.864617 949939 usertrap_amd64.go:225] [ 49321: 49321] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:26.884155 949939 task_exit.go:204] [ 49315: 49322] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:26.884511 949939 task_exit.go:204] [ 49315: 49322] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:26.884762 949939 task_signals.go:443] [ 46: 46] Discarding ignored signal 17 D0620 03:41:26.885270 949939 task_exit.go:204] [ 49315: 49315] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:27.494394 949939 usertrap_amd64.go:212] [ 49321: 49321] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:27.501144 949939 usertrap_amd64.go:122] [ 49321: 49321] Allocate a new trap: 0xc00691a000 43 D0620 03:41:27.501272 949939 usertrap_amd64.go:225] [ 49321: 49321] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:27.513407 949939 usertrap_amd64.go:212] [ 49321: 49321] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:27.513559 949939 usertrap_amd64.go:122] [ 49321: 49321] Allocate a new trap: 0xc00691a000 44 D0620 03:41:27.513637 949939 usertrap_amd64.go:225] [ 49321: 49321] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:27.523195 949939 task_exit.go:204] [ 49321: 49321] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:27.523434 949939 task_exit.go:204] [ 49321: 49321] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:27.523718 949939 task_signals.go:204] [ 49321: 49327] Signal 49321, PID: 49327, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:27.523876 949939 task_exit.go:204] [ 49321: 49327] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:27.524266 949939 task_exit.go:204] [ 49321: 49327] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:27.524381 949939 task_exit.go:204] [ 49321: 49327] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:27.524662 949939 task_signals.go:204] [ 49321: 49325] Signal 49321, PID: 49325, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:27.524845 949939 task_exit.go:204] [ 49321: 49325] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:27.525324 949939 task_signals.go:204] [ 49321: 49324] Signal 49321, PID: 49324, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:27.525581 949939 task_exit.go:204] [ 49321: 49325] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:27.525721 949939 task_exit.go:204] [ 49321: 49325] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:27.525968 949939 task_signals.go:204] [ 49321: 49326] Signal 49321, PID: 49326, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:27.526167 949939 task_exit.go:204] [ 49321: 49326] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:27.526455 949939 task_exit.go:204] [ 49321: 49326] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:27.526586 949939 task_exit.go:204] [ 49321: 49326] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:27.526853 949939 task_exit.go:204] [ 49321: 49324] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:27.547485 949939 task_exit.go:204] [ 49321: 49324] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:27.547595 949939 task_exit.go:204] [ 49321: 49324] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:27.547705 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:27.561278 949939 task_exit.go:204] [ 49321: 49321] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:28.910247 949939 task_signals.go:204] [ 49296: 49298] Signal 49296, PID: 49298, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:28.910582 949939 task_exit.go:204] [ 49296: 49298] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:28.930725 949939 task_exit.go:204] [ 49296: 49298] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:28.930848 949939 task_exit.go:204] [ 49296: 49298] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:28.930952 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:28.931168 949939 task_exit.go:204] [ 49296: 49296] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:28 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x7ffffeffffffffff) (async, rerun: 64) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) lsetxattr(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)=@random={'btrfs.', '\x00'}, &(0x7f0000000180)='/\x00', 0x2, 0x1) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) 03:41:28 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async, rerun: 64) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)={0x0, 0xfb, 0xc5, 0x4, 0x9, "a71556e02da2d0b02677e0b0929180b9", "8958897304ae44435450f461914dfc7461001cd023a2054fc97fd932a094e25f861c0d2b48fcc5a3922bf1991b4685272f7f82f096f9fd66bbf3565db8f8b20469e84dbe747c638696bb10f022ba94103be544602ab3fd33acbfb5ffa59ed48bc8584176b66e3998b25f7259a853765048ef7694de6aea2e7a6115f6c22611e05b2b17043bd4b032d5a5cc2cac6bb34cf38fefba14677e7405fc47516cfb0d3b1288554cbd699c1ff90df4de82ee0d6e"}, 0xc5, 0x2) (async) chdir(&(0x7f0000000040)='./file0\x00') 03:41:28 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) mkdir(&(0x7f0000000140)='./file0/file1\x00', 0xcf1cd5b868985a2) (rerun: 64) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000180)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f00000001c0)) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 03:41:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @broadcast}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, 0x0, 0x0) D0620 03:41:28.980097 949939 usertrap_amd64.go:212] [ 49328: 49328] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:28.980348 949939 usertrap_amd64.go:122] [ 49328: 49328] Allocate a new trap: 0xc0021b41b0 40 D0620 03:41:28.981078 949939 usertrap_amd64.go:225] [ 49328: 49328] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:28.984499 949939 usertrap_amd64.go:212] [ 49328: 49328] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:28.984571 949939 usertrap_amd64.go:122] [ 49328: 49328] Allocate a new trap: 0xc0021b41b0 41 D0620 03:41:28.984642 949939 usertrap_amd64.go:225] [ 49328: 49328] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:28.992713 949939 usertrap_amd64.go:212] [ 49330: 49330] Found the pattern at ip 56111a6ca720:sysno 109 D0620 03:41:28.992815 949939 usertrap_amd64.go:122] [ 49330: 49330] Allocate a new trap: 0xc001a6e000 40 D0620 03:41:28.993496 949939 usertrap_amd64.go:225] [ 49330: 49330] Apply the binary patch addr 56111a6ca720 trap addr 61c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 28 6 0]) D0620 03:41:28.997382 949939 usertrap_amd64.go:212] [ 49330: 49330] Found the pattern at ip 56111a6a4bb0:sysno 266 D0620 03:41:28.997446 949939 usertrap_amd64.go:122] [ 49330: 49330] Allocate a new trap: 0xc001a6e000 41 D0620 03:41:28.997514 949939 usertrap_amd64.go:225] [ 49330: 49330] Apply the binary patch addr 56111a6a4bb0 trap addr 61cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 28 6 0]) D0620 03:41:29.001437 949939 usertrap_amd64.go:212] [ 49329: 49329] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:29.001815 949939 usertrap_amd64.go:122] [ 49329: 49329] Allocate a new trap: 0xc006c98030 40 D0620 03:41:29.002141 949939 usertrap_amd64.go:212] [ 49328: 49328] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:29.002216 949939 usertrap_amd64.go:122] [ 49328: 49328] Allocate a new trap: 0xc0021b41b0 42 D0620 03:41:29.002271 949939 usertrap_amd64.go:225] [ 49328: 49328] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:29.002405 949939 usertrap_amd64.go:225] [ 49329: 49329] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:29.007029 949939 usertrap_amd64.go:212] [ 49329: 49329] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:29.007161 949939 usertrap_amd64.go:122] [ 49329: 49329] Allocate a new trap: 0xc006c98030 41 D0620 03:41:29.007570 949939 usertrap_amd64.go:225] [ 49329: 49329] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:29.009725 949939 usertrap_amd64.go:212] [ 49331: 49331] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:29.009861 949939 usertrap_amd64.go:122] [ 49331: 49331] Allocate a new trap: 0xc002380090 40 D0620 03:41:29.010685 949939 usertrap_amd64.go:225] [ 49331: 49331] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:29.021088 949939 usertrap_amd64.go:212] [ 49331: 49331] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:29.021278 949939 usertrap_amd64.go:122] [ 49331: 49331] Allocate a new trap: 0xc002380090 41 D0620 03:41:29.021411 949939 usertrap_amd64.go:225] [ 49331: 49331] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) I0620 03:41:29.022433 949939 pgalloc.go:658] Disabling pgalloc.MemoryFile.AllocateAndFill pre-population: mlock failed: cannot allocate memory D0620 03:41:29.025813 949939 usertrap_amd64.go:212] [ 49328: 49328] Found the pattern at ip 5588aa8c70aa:sysno 230 D0620 03:41:29.026045 949939 usertrap_amd64.go:122] [ 49328: 49328] Allocate a new trap: 0xc0021b41b0 43 D0620 03:41:29.026157 949939 usertrap_amd64.go:225] [ 49328: 49328] Apply the binary patch addr 5588aa8c70aa trap addr 64d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:29.027542 949939 usertrap_amd64.go:212] [ 49330: 49330] Found the pattern at ip 56111a6a67aa:sysno 56 D0620 03:41:29.027629 949939 usertrap_amd64.go:122] [ 49330: 49330] Allocate a new trap: 0xc001a6e000 42 D0620 03:41:29.027732 949939 usertrap_amd64.go:225] [ 49330: 49330] Apply the binary patch addr 56111a6a67aa trap addr 61d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0620 03:41:29.028537 949939 usertrap_amd64.go:212] [ 49328: 49328] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:29.028629 949939 usertrap_amd64.go:122] [ 49328: 49328] Allocate a new trap: 0xc0021b41b0 44 D0620 03:41:29.028710 949939 usertrap_amd64.go:225] [ 49328: 49328] Apply the binary patch addr 5588aa854124 trap addr 64dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 77 6 0]) D0620 03:41:29.033245 949939 task_exit.go:204] [ 49328: 49328] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.033498 949939 task_exit.go:204] [ 49328: 49328] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.033670 949939 task_signals.go:204] [ 49328: 49332] Signal 49328, PID: 49332, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.033784 949939 task_signals.go:204] [ 49328: 49333] Signal 49328, PID: 49333, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.033829 949939 task_exit.go:204] [ 49328: 49332] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.034140 949939 task_exit.go:204] [ 49328: 49332] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.034288 949939 task_exit.go:204] [ 49328: 49332] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.034617 949939 task_exit.go:204] [ 49328: 49333] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.043270 949939 task_exit.go:204] [ 49328: 49333] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.043462 949939 task_exit.go:204] [ 49328: 49333] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.043849 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:29.044276 949939 usertrap_amd64.go:212] [ 49329: 49329] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:29.044445 949939 usertrap_amd64.go:122] [ 49329: 49329] Allocate a new trap: 0xc006c98030 42 D0620 03:41:29.044595 949939 task_exit.go:204] [ 49328: 49328] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.044637 949939 usertrap_amd64.go:225] [ 49329: 49329] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) 03:41:29 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1', "e2923a0493b0bd89e0084b7758817cc30e5feadc3c4b8a40d4fcc0cf1286851cbf895875526e4ac743e3ee6faa9adb2f377e77b7a9347d1ba4cda22010dc684286f370533fc4f0f765f83d0eefe3d9ac9fc7409263eec741650afc4ef8200ec69745401fa1022f12ba01b256c067be13e77e3714834a9ac267e3c479ec8208730bd29ca89eceb3"}, 0x8b) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0/file1\x00', &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/293], 0x110, 0x2) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000280)={0x1, [0x0]}) D0620 03:41:29.051728 949939 task_signals.go:470] [ 49329: 49336] Notified of signal 25 D0620 03:41:29.052638 949939 usertrap_amd64.go:212] [ 49331: 49331] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:29.052708 949939 usertrap_amd64.go:122] [ 49331: 49331] Allocate a new trap: 0xc002380090 42 D0620 03:41:29.052789 949939 usertrap_amd64.go:225] [ 49331: 49331] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:29.053472 949939 task_signals.go:204] [ 49329: 49336] Signal 49329, PID: 49336, TID: 0, fault addr: 0x19: terminating thread group D0620 03:41:29.053785 949939 task_exit.go:204] [ 49329: 49336] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.054744 949939 task_signals.go:204] [ 49329: 49329] Signal 49329, PID: 49329, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.054752 949939 task_signals.go:204] [ 49329: 49335] Signal 49329, PID: 49335, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.054860 949939 task_signals.go:204] [ 49329: 49337] Signal 49329, PID: 49337, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.054983 949939 task_exit.go:204] [ 49329: 49329] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.055469 949939 task_exit.go:204] [ 49329: 49329] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.055828 949939 task_exit.go:204] [ 49329: 49336] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.055885 949939 task_exit.go:204] [ 49329: 49336] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.056034 949939 task_exit.go:204] [ 49329: 49335] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.056132 949939 task_exit.go:204] [ 49329: 49337] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.056385 949939 task_exit.go:204] [ 49329: 49335] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.056457 949939 task_exit.go:204] [ 49329: 49335] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.062443 949939 task_exit.go:204] [ 49329: 49337] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.062543 949939 task_exit.go:204] [ 49329: 49337] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.062712 949939 task_signals.go:443] [ 47: 47] Discarding ignored signal 17 D0620 03:41:29.063316 949939 task_exit.go:204] [ 49329: 49329] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:29 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x7ffffeffffffffff) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) lsetxattr(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000140)=@random={'btrfs.', '\x00'}, &(0x7f0000000180)='/\x00', 0x2, 0x1) (async) truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) D0620 03:41:29.077095 949939 usertrap_amd64.go:212] [ 49331: 49331] Found the pattern at ip 559fa90e60aa:sysno 230 D0620 03:41:29.077351 949939 usertrap_amd64.go:122] [ 49331: 49331] Allocate a new trap: 0xc002380090 43 D0620 03:41:29.077472 949939 usertrap_amd64.go:225] [ 49331: 49331] Apply the binary patch addr 559fa90e60aa trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0620 03:41:29.098768 949939 usertrap_amd64.go:212] [ 49331: 49331] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:29.098845 949939 usertrap_amd64.go:122] [ 49331: 49331] Allocate a new trap: 0xc002380090 44 D0620 03:41:29.098922 949939 usertrap_amd64.go:225] [ 49331: 49331] Apply the binary patch addr 559fa9073124 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0620 03:41:29.098896 949939 usertrap_amd64.go:212] [ 49330: 49330] Found the pattern at ip 56111a6ca0aa:sysno 230 D0620 03:41:29.099031 949939 usertrap_amd64.go:122] [ 49330: 49330] Allocate a new trap: 0xc001a6e000 43 D0620 03:41:29.099135 949939 usertrap_amd64.go:225] [ 49330: 49330] Apply the binary patch addr 56111a6ca0aa trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0620 03:41:29.112168 949939 task_exit.go:204] [ 49331: 49331] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.112459 949939 task_exit.go:204] [ 49331: 49331] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.112433 949939 task_signals.go:204] [ 49331: 49339] Signal 49331, PID: 49339, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.112613 949939 task_signals.go:204] [ 49331: 49338] Signal 49331, PID: 49338, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.112842 949939 task_exit.go:204] [ 49331: 49338] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.113080 949939 task_exit.go:204] [ 49331: 49338] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.113147 949939 task_exit.go:204] [ 49331: 49338] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.113295 949939 task_exit.go:204] [ 49331: 49339] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.113292 949939 task_signals.go:204] [ 49331: 49340] Signal 49331, PID: 49340, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.113433 949939 task_exit.go:204] [ 49331: 49340] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.113698 949939 task_exit.go:204] [ 49331: 49340] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.113779 949939 task_exit.go:204] [ 49331: 49340] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.116171 949939 usertrap_amd64.go:212] [ 49341: 49341] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:29.116415 949939 usertrap_amd64.go:122] [ 49341: 49341] Allocate a new trap: 0xc014b20120 40 D0620 03:41:29.117348 949939 usertrap_amd64.go:225] [ 49341: 49341] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:29.122725 949939 usertrap_amd64.go:212] [ 49341: 49341] Found the pattern at ip 5588aa8a1bb0:sysno 266 D0620 03:41:29.122869 949939 usertrap_amd64.go:122] [ 49341: 49341] Allocate a new trap: 0xc014b20120 41 D0620 03:41:29.123032 949939 usertrap_amd64.go:225] [ 49341: 49341] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) D0620 03:41:29.123230 949939 usertrap_amd64.go:212] [ 49343: 49343] Found the pattern at ip 55e1e03de720:sysno 109 D0620 03:41:29.123406 949939 usertrap_amd64.go:122] [ 49343: 49343] Allocate a new trap: 0xc001a6e0c0 40 D0620 03:41:29.124147 949939 usertrap_amd64.go:225] [ 49343: 49343] Apply the binary patch addr 55e1e03de720 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0620 03:41:29.125181 949939 task_exit.go:204] [ 49331: 49339] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.125232 949939 task_exit.go:204] [ 49331: 49339] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.125495 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:29.125949 949939 task_exit.go:204] [ 49331: 49331] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:29 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x105042, 0x0) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0x1}) D0620 03:41:29.137166 949939 usertrap_amd64.go:212] [ 49343: 49343] Found the pattern at ip 55e1e03b8bb0:sysno 266 D0620 03:41:29.137286 949939 usertrap_amd64.go:122] [ 49343: 49343] Allocate a new trap: 0xc001a6e0c0 41 D0620 03:41:29.137377 949939 usertrap_amd64.go:225] [ 49343: 49343] Apply the binary patch addr 55e1e03b8bb0 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0620 03:41:29.151333 949939 usertrap_amd64.go:212] [ 49341: 49341] Found the pattern at ip 5588aa8a37aa:sysno 56 D0620 03:41:29.151438 949939 usertrap_amd64.go:122] [ 49341: 49341] Allocate a new trap: 0xc014b20120 42 D0620 03:41:29.151527 949939 usertrap_amd64.go:225] [ 49341: 49341] Apply the binary patch addr 5588aa8a37aa trap addr 64d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 77 6 0]) D0620 03:41:29.165716 949939 usertrap_amd64.go:212] [ 49344: 49344] Found the pattern at ip 559fa90e6720:sysno 109 D0620 03:41:29.165851 949939 usertrap_amd64.go:122] [ 49344: 49344] Allocate a new trap: 0xc009c861b0 40 D0620 03:41:29.166611 949939 usertrap_amd64.go:225] [ 49344: 49344] Apply the binary patch addr 559fa90e6720 trap addr 65c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 92 6 0]) D0620 03:41:29.169421 949939 usertrap_amd64.go:212] [ 49341: 49341] Found the pattern at ip 5588aa854124:sysno 3 D0620 03:41:29.169501 949939 usertrap_amd64.go:122] [ 49341: 49341] Allocate a new trap: 0xc014b20120 43 D0620 03:41:29.169578 949939 usertrap_amd64.go:225] [ 49341: 49341] Apply the binary patch addr 5588aa854124 trap addr 64d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 77 6 0]) D0620 03:41:29.170059 949939 usertrap_amd64.go:212] [ 49344: 49344] Found the pattern at ip 559fa90c0bb0:sysno 266 D0620 03:41:29.170406 949939 usertrap_amd64.go:122] [ 49344: 49344] Allocate a new trap: 0xc009c861b0 41 D0620 03:41:29.170689 949939 usertrap_amd64.go:225] [ 49344: 49344] Apply the binary patch addr 559fa90c0bb0 trap addr 65cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 92 6 0]) D0620 03:41:29.176145 949939 task_exit.go:204] [ 49341: 49341] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.176490 949939 task_exit.go:204] [ 49341: 49341] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.176671 949939 task_signals.go:204] [ 49341: 49345] Signal 49341, PID: 49345, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.176791 949939 task_exit.go:204] [ 49341: 49345] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.181372 949939 task_exit.go:204] [ 49341: 49345] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.181440 949939 task_exit.go:204] [ 49341: 49345] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.181571 949939 task_signals.go:443] [ 48: 48] Discarding ignored signal 17 D0620 03:41:29.181853 949939 task_exit.go:204] [ 49341: 49341] Transitioning from exit state TaskExitZombie to TaskExitDead 03:41:29 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1', "e2923a0493b0bd89e0084b7758817cc30e5feadc3c4b8a40d4fcc0cf1286851cbf895875526e4ac743e3ee6faa9adb2f377e77b7a9347d1ba4cda22010dc684286f370533fc4f0f765f83d0eefe3d9ac9fc7409263eec741650afc4ef8200ec69745401fa1022f12ba01b256c067be13e77e3714834a9ac267e3c479ec8208730bd29ca89eceb3"}, 0x8b) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0/file1\x00', &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/293], 0x110, 0x2) r1 = syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000280)={0x1, [0x0]}) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1', "e2923a0493b0bd89e0084b7758817cc30e5feadc3c4b8a40d4fcc0cf1286851cbf895875526e4ac743e3ee6faa9adb2f377e77b7a9347d1ba4cda22010dc684286f370533fc4f0f765f83d0eefe3d9ac9fc7409263eec741650afc4ef8200ec69745401fa1022f12ba01b256c067be13e77e3714834a9ac267e3c479ec8208730bd29ca89eceb3"}, 0x8b) (async) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0/file1\x00', &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="00fb1000ff00422a3b70b12f6a11d13f8fe6104863d76ba9621eb66b56afa97f1726d9a9412ae3df50ef8ec209802ef8dbf447cf5d1a023bf709fcb95023897ed060a9bb1c93db6732d49d1ddbf02677e62dbb9e7f20d15dd929801ffc99eb7dfaf526ee353d8237575647719110be494f5a44f381e0895cef51be01f6727166319073aa7d9053e5f45aed98a1adbb7b1344b2ff1aa9d2304cca8f9dbda01b65c9f87cb89afa8539088b0f8ca12c8f963fe47417652ca3899a432325eb28d0cf7dd1dc46e23f216248e423e03a524ab60f5c94a9ebc5a7490160999262b4c5dc0c24a3107f3896a983556cc24d1e30689f521ff46364c73c7382434a2e480751c1bb7e6ba6b2a2114b6f12c60583d2b542de97c44b00"/293], 0x110, 0x2) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2840000, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) (async) ioctl$FIONCLEX(r1, 0x5450) (async) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000280)={0x1, [0x0]}) (async) D0620 03:41:29.198155 949939 usertrap_amd64.go:212] [ 49344: 49344] Found the pattern at ip 559fa90c27aa:sysno 56 D0620 03:41:29.198251 949939 usertrap_amd64.go:122] [ 49344: 49344] Allocate a new trap: 0xc009c861b0 42 D0620 03:41:29.198312 949939 usertrap_amd64.go:225] [ 49344: 49344] Apply the binary patch addr 559fa90c27aa trap addr 65d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0620 03:41:29.203357 949939 usertrap_amd64.go:212] [ 49343: 49343] Found the pattern at ip 55e1e03ba7aa:sysno 56 D0620 03:41:29.203682 949939 usertrap_amd64.go:122] [ 49343: 49343] Allocate a new trap: 0xc001a6e0c0 42 D0620 03:41:29.203859 949939 usertrap_amd64.go:225] [ 49343: 49343] Apply the binary patch addr 55e1e03ba7aa trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0620 03:41:29.210555 949939 usertrap_amd64.go:212] [ 49344: 49344] Found the pattern at ip 559fa9073124:sysno 3 D0620 03:41:29.210833 949939 usertrap_amd64.go:122] [ 49344: 49344] Allocate a new trap: 0xc009c861b0 43 D0620 03:41:29.211003 949939 usertrap_amd64.go:225] [ 49344: 49344] Apply the binary patch addr 559fa9073124 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) fatal error: too many address space collisions for -race mode D0620 03:41:29.220691 949939 task_exit.go:204] [ 49344: 49344] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.221015 949939 task_exit.go:204] [ 49344: 49344] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.221305 949939 task_signals.go:204] [ 49344: 49346] Signal 49344, PID: 49346, TID: 0, fault addr: 0x9: terminating thread group D0620 03:41:29.221404 949939 task_exit.go:204] [ 49344: 49346] Transitioning from exit state TaskExitNone to TaskExitInitiated D0620 03:41:29.222479 949939 usertrap_amd64.go:212] [ 49348: 49348] Found the pattern at ip 5588aa8c7720:sysno 109 D0620 03:41:29.222576 949939 usertrap_amd64.go:122] [ 49348: 49348] Allocate a new trap: 0xc002b2e2d0 40 D0620 03:41:29.223283 949939 usertrap_amd64.go:225] [ 49348: 49348] Apply the binary patch addr 5588aa8c7720 trap addr 64c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 76 6 0]) D0620 03:41:29.226396 949939 task_exit.go:204] [ 49344: 49346] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0620 03:41:29.226467 949939 task_exit.go:204] [ 49344: 49346] Transitioning from exit state TaskExitZombie to TaskExitDead D0620 03:41:29.226544 949939 task_signals.go:443] [ 45: 45] Discarding ignored signal 17 D0620 03:41:29.226765 949939 task_exit.go:204] [ 49344: 49344] Transitioning from exit state TaskExitZombie to TaskExitDead runtime stack: runtime.throw({0x52b1d5?, 0x0?}) GOROOT/src/runtime/panic.go:1047 +0x5d fp=0x7f19727fc068 sp=0x7f19727fc038 pc=0x12f021d runtime.(*mheap).sysAlloc(0x286e200, 0xc3ffffffff?, 0x287e398, 0x1) GOROOT/src/runtime/malloc.go:654 +0x645 fp=0x7f19727fc0f8 sp=0x7f19727fc068 pc=0x12c5d45 runtime.(*mheap).grow(0x286e200, 0x17ffffd?) GOROOT/src/runtime/mheap.go:1472 +0x7f fp=0x7f19727fc170 sp=0x7f19727fc0f8 pc=0x12e12bf runtime.(*mheap).allocSpan(0x286e200, 0x17ffffd, 0x0, 0xff?) GOROOT/src/runtime/mheap.go:1243 +0x1b7 fp=0x7f19727fc208 sp=0x7f19727fc170 pc=0x12e0bd7 runtime.(*mheap).alloc.func1() GOROOT/src/runtime/mheap.go:961 +0x65 fp=0x7f19727fc250 sp=0x7f19727fc208 pc=0x12e0685 runtime.systemstack() src/runtime/asm_amd64.s:496 +0x49 fp=0x7f19727fc258 sp=0x7f19727fc250 pc=0x1326ba9 goroutine 3199574 [running]: runtime.systemstack_switch() src/runtime/asm_amd64.s:463 fp=0xc004c44d60 sp=0xc004c44d58 pc=0x1326b40 runtime.(*mheap).alloc(0x2fffffa000?, 0x17ffffd?, 0x5?) GOROOT/src/runtime/mheap.go:955 +0x65 fp=0xc004c44da8 sp=0xc004c44d60 pc=0x12e05c5 runtime.(*mcache).allocLarge(0xc000200e28?, 0x2fffffa000, 0x0) GOROOT/src/runtime/mcache.go:234 +0x85 fp=0xc004c44df0 sp=0xc004c44da8 pc=0x12cfbc5 runtime.mallocgc(0x2fffffa000, 0x44c7e0, 0x1) GOROOT/src/runtime/malloc.go:1053 +0x52f fp=0xc004c44e70 sp=0xc004c44df0 pc=0x12c64cf runtime.makeslice(0x140000000?, 0x7fffff0140000000?, 0xc005000000?) GOROOT/src/runtime/slice.go:103 +0x52 fp=0xc004c44e98 sp=0xc004c44e70 pc=0x1309cb2 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).MapInternal(0xc000200e00?, {0x140000000, 0x7fffff0140000000}, {0x70?, 0x10?, 0x6f?}) pkg/sentry/pgalloc/pgalloc.go:814 +0x1b4 fp=0xc004c44f90 sp=0xc004c44e98 pc=0x188e7d4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).AllocateAndFill(0xc00890ef70?, 0x7fffff0000000000, 0x132c105?, 0x1, {0x82ab60, 0xc011757260}) pkg/sentry/pgalloc/pgalloc.go:603 +0xd6 fp=0xc004c45050 sp=0xc004c44f90 pc=0x188cdd6 gvisor.dev/gvisor/pkg/sentry/fsutil.(*FileRangeSet).Fill(0xc0024b5190?, {0x846360?, 0xc00d1db500}, {0xc0024b51a8?, 0x12bff65?}, {0xc0024b51b8?, 0x12bfddd?}, 0x7ffffeffffffffff, 0xc01df4b510?, 0x3, ...) pkg/sentry/fsutil/file_range_set.go:125 +0x36e fp=0xc004c45150 sp=0xc004c45050 pc=0x18c5fee gvisor.dev/gvisor/pkg/sentry/fsimpl/tmpfs.(*regularFileFD).Allocate(0xc00afd7380, {0x846360, 0xc00d1db500}, 0x15ec53a?, 0x0, 0x7ffffeffffffffff) pkg/sentry/fsimpl/tmpfs/regular_file.go:391 +0x36a fp=0xc004c45300 sp=0xc004c45150 pc=0x19e1b8a gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).Allocate(0xc00afd7380, {0x846360, 0xc00d1db500}, 0xc00d1dbcb0?, 0x0?, 0x0?) pkg/sentry/vfs/file_description.go:589 +0xa6 fp=0xc004c45378 sp=0xc004c45300 pc=0x182efe6 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Fallocate(0xc00d1db500, 0x12fa705?, {{0x3}, {0x0}, {0x0}, {0x7ffffeffffffffff}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_file.go:1642 +0x3b3 fp=0xc004c45480 sp=0xc004c45378 pc=0x1d7e1f3 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc00d1db500, 0x11d, {{0x3}, {0x0}, {0x0}, {0x7ffffeffffffffff}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x9c2 fp=0xc004c45960 sp=0xc004c45480 pc=0x1b84fa2 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc00d1db500, 0x133a57a?, {{0x3}, {0x0}, {0x0}, {0x7ffffeffffffffff}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x7d fp=0xc004c459f8 sp=0xc004c45960 pc=0x1b86d9d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0x0?, 0x0?, {{0x3}, {0x0}, {0x0}, {0x7ffffeffffffffff}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x8f fp=0xc004c45a70 sp=0xc004c459f8 pc=0x1b8674f gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc00d1db500) pkg/sentry/kernel/task_syscall.go:257 +0x4c5 fp=0xc004c45b98 sp=0xc004c45a70 pc=0x1b862e5 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc00d1db500?, 0xc00d1db500) pkg/sentry/kernel/task_run.go:269 +0x1d4b fp=0xc004c45e70 sp=0xc004c45b98 pc=0x1b70b6b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc00d1db500, 0xc0c5) pkg/sentry/kernel/task_run.go:98 +0x41b fp=0xc004c45fb0 sp=0xc004c45e70 pc=0x1b6e3fb gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:383 +0x48 fp=0xc004c45fe0 sp=0xc004c45fb0 pc=0x1b82aa8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc004c45fe8 sp=0xc004c45fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:383 +0x1ad goroutine 1 [semacquire, 29 minutes]: runtime.gopark(0xc0001cc7c0?, 0x3?, 0x40?, 0xe5?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000a06768 sp=0xc000a06748 pc=0x12f3016 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc000217230, 0x28?, 0x1, 0x0, 0x1?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc000a067d0 sp=0xc000a06768 pc=0x1305ecf sync.runtime_Semacquire(0xc000217230?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc000a06808 sp=0xc000a067d0 pc=0x1324347 sync.(*WaitGroup).Wait(0xc000217228) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc000a06838 sp=0xc000a06808 pc=0x133caa5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1128 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc00026c200) runsc/boot/loader.go:1197 +0x65 fp=0xc000a06860 sp=0xc000a06838 pc=0x22ec825 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc00024bb80, {0xc000040350?, 0x12?}, 0xc0003f3e00, {0xc0003f6ca0, 0x2, 0xc0000061a0?}) runsc/cmd/boot.go:457 +0x22f6 fp=0xc000a07060 sp=0xc000a06860 pc=0x26710b6 github.com/google/subcommands.(*Commander).Execute(0xc000206000, {0x8390d8, 0xc000044058}, {0xc0003f6ca0, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x722 fp=0xc000a07178 sp=0xc000a07060 pc=0x1433182 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:260 +0xba70 fp=0xc000a07f68 sp=0xc000a07178 pc=0x26bf2b0 main.main() runsc/main.go:31 +0x25 fp=0xc000a07f80 sp=0xc000a07f68 pc=0x26bfac5 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc000a07fe0 sp=0xc000a07f80 pc=0x12f2bc7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000a07fe8 sp=0xc000a07fe0 pc=0x1328d61 goroutine 2 [force gc (idle), 29 minutes]: runtime.gopark(0x2853720?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001347b0 sp=0xc000134790 pc=0x12f3016 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc0001347e0 sp=0xc0001347b0 pc=0x12f2e50 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001347e8 sp=0xc0001347e0 pc=0x1328d61 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 3 [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000148f80 sp=0xc000148f60 pc=0x12f3016 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:319 +0xde fp=0xc000148fc8 sp=0xc000148f80 pc=0x12dd47e runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc000148fe0 sp=0xc000148fc8 pc=0x12d2646 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000148fe8 sp=0xc000148fe0 pc=0x1328d61 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 4 [GC scavenge wait]: runtime.gopark(0x22354215d0caf0?, 0x29375e?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000142f70 sp=0xc000142f50 pc=0x12f3016 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x2852a00) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000142fa0 sp=0xc000142f70 pc=0x12db373 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000142fc8 sp=0xc000142fa0 pc=0x12db945 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000142fe0 sp=0xc000142fc8 pc=0x12d25e6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000142fe8 sp=0xc000142fe0 pc=0x1328d61 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 5 [finalizer wait, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000143e28 sp=0xc000143e08 pc=0x12f3016 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x13d fp=0xc000143fe0 sp=0xc000143e28 pc=0x12d15fd runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000143fe8 sp=0xc000143fe0 pc=0x1328d61 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 6 [GC worker (idle)]: runtime.gopark(0x22354804f75306?, 0x3?, 0xec?, 0xc6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bff50 sp=0xc0004bff30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bffe0 sp=0xc0004bff50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bffe8 sp=0xc0004bffe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 18 [GC worker (idle)]: runtime.gopark(0x56a748?, 0xc000190000?, 0x1a?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bef50 sp=0xc0004bef30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004befe0 sp=0xc0004bef50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004befe8 sp=0xc0004befe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 34 [GC worker (idle)]: runtime.gopark(0x2235480509fb77?, 0x3?, 0xfd?, 0x50?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bdf50 sp=0xc0004bdf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bdfe0 sp=0xc0004bdf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bdfe8 sp=0xc0004bdfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle)]: runtime.gopark(0x22354804f65e1a?, 0x3?, 0x76?, 0xa1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bcf50 sp=0xc0004bcf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bcfe0 sp=0xc0004bcf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bcfe8 sp=0xc0004bcfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 19 [GC worker (idle)]: runtime.gopark(0x223548046b2bed?, 0x3?, 0x26?, 0x25?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bbf50 sp=0xc0004bbf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bbfe0 sp=0xc0004bbf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bbfe8 sp=0xc0004bbfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle)]: runtime.gopark(0x22354804704d7b?, 0x3?, 0xec?, 0x4a?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004baf50 sp=0xc0004baf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bafe0 sp=0xc0004baf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bafe8 sp=0xc0004bafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle)]: runtime.gopark(0x2235480362acf4?, 0x3?, 0xe5?, 0xcd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b9f50 sp=0xc0004b9f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b9fe0 sp=0xc0004b9f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b9fe8 sp=0xc0004b9fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle)]: runtime.gopark(0x2235480466d1b5?, 0x3?, 0x52?, 0xdb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b8f50 sp=0xc0004b8f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b8fe0 sp=0xc0004b8f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b8fe8 sp=0xc0004b8fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle)]: runtime.gopark(0x2235480362d21a?, 0x3?, 0x35?, 0xd3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507f50 sp=0xc000507f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000507fe0 sp=0xc000507f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle)]: runtime.gopark(0x22354803620e52?, 0x3?, 0x93?, 0x22?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506f50 sp=0xc000506f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000506fe0 sp=0xc000506f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle)]: runtime.gopark(0x2235480472ed0b?, 0x3?, 0xc6?, 0xac?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505f50 sp=0xc000505f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000505fe0 sp=0xc000505f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x40?, 0x2b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504f50 sp=0xc000504f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000504fe0 sp=0xc000504f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle)]: runtime.gopark(0x223548047614ee?, 0x3?, 0xe5?, 0xb9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503f50 sp=0xc000503f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000503fe0 sp=0xc000503f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle)]: D0620 03:41:29.233451 949939 usertrap_amd64.go:212] [ 49348: 49348] Found the pattern at ip 5588aa8a1bb0:sysno 266 runtime.gopark(0x22354804f8176e?, 0x3?, 0x10?, 0x99?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502f50 sp=0xc000502f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000502fe0 sp=0xc000502f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle)]: runtime.gopark(0x22354804f786e6?, 0x1?, 0x54?, 0xd2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000501f50 sp=0xc000501f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000501fe0 sp=0xc000501f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000501fe8 sp=0xc000501fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle)]: D0620 03:41:29.233534 949939 usertrap_amd64.go:122] [ 49348: 49348] Allocate a new trap: 0xc002b2e2d0 41 runtime.gopark(0x22354804673be1?, 0x3?, 0x0?, 0x60?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000500f50 sp=0xc000500f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000500fe0 sp=0xc000500f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000500fe8 sp=0xc000500fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 40 [GC worker (idle)]: runtime.gopark(0x22354804853fc8?, 0x3?, 0xcd?, 0x24?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004cdf50 sp=0xc0004cdf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004cdfe0 sp=0xc0004cdf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cdfe8 sp=0xc0004cdfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle)]: D0620 03:41:29.233633 949939 usertrap_amd64.go:225] [ 49348: 49348] Apply the binary patch addr 5588aa8a1bb0 trap addr 64cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 76 6 0]) runtime.gopark(0x2235480485c52e?, 0x3?, 0x5c?, 0xe3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ccf50 sp=0xc0004ccf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ccfe0 sp=0xc0004ccf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ccfe8 sp=0xc0004ccfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle)]: runtime.gopark(0x223548047db88e?, 0x3?, 0x2d?, 0x59?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004cbf50 sp=0xc0004cbf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004cbfe0 sp=0xc0004cbf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cbfe8 sp=0xc0004cbfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 41 [GC worker (idle)]: runtime.gopark(0x223548036292fa?, 0x3?, 0x45?, 0xd7?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004caf50 sp=0xc0004caf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004cafe0 sp=0xc0004caf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cafe8 sp=0xc0004cafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle)]: runtime.gopark(0x223548047de3ae?, 0x3?, 0x9e?, 0x1e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c9f50 sp=0xc0004c9f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c9fe0 sp=0xc0004c9f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c9fe8 sp=0xc0004c9fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0xe7?, 0xae?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c8f50 sp=0xc0004c8f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c8fe0 sp=0xc0004c8f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c8fe8 sp=0xc0004c8fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 42 [GC worker (idle)]: runtime.gopark(0x223548046fefe3?, 0x3?, 0xb9?, 0x25?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c7f50 sp=0xc0004c7f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c7fe0 sp=0xc0004c7f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c7fe8 sp=0xc0004c7fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle)]: runtime.gopark(0x223548047e1360?, 0x3?, 0xda?, 0xdb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c6f50 sp=0xc0004c6f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c6fe0 sp=0xc0004c6f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c6fe8 sp=0xc0004c6fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle)]: runtime.gopark(0x22354804f7f13a?, 0x3?, 0x27?, 0xa8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019bf50 sp=0xc00019bf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019bfe0 sp=0xc00019bf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019bfe8 sp=0xc00019bfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 43 [GC worker (idle)]: runtime.gopark(0x2235480485c66e?, 0x3?, 0x44?, 0x15?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019af50 sp=0xc00019af30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019afe0 sp=0xc00019af50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019afe8 sp=0xc00019afe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle)]: runtime.gopark(0x22354804f947d7?, 0x3?, 0x8b?, 0xa7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000199f50 sp=0xc000199f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000199fe0 sp=0xc000199f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000199fe8 sp=0xc000199fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle)]: runtime.gopark(0x22354804885d66?, 0x3?, 0xc8?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000198f50 sp=0xc000198f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000198fe0 sp=0xc000198f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000198fe8 sp=0xc000198fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 44 [GC worker (idle)]: runtime.gopark(0x2235480467da0b?, 0x3?, 0x57?, 0xf6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000197f50 sp=0xc000197f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000197fe0 sp=0xc000197f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000197fe8 sp=0xc000197fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle)]: runtime.gopark(0x22354804f7ed1f?, 0x3?, 0xbe?, 0x16?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000196f50 sp=0xc000196f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000196fe0 sp=0xc000196f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000196fe8 sp=0xc000196fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle)]: runtime.gopark(0x223548046fe917?, 0x3?, 0xfc?, 0x19?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000195f50 sp=0xc000195f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000195fe0 sp=0xc000195f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000195fe8 sp=0xc000195fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle)]: runtime.gopark(0x22354804f5651e?, 0x3?, 0xe1?, 0x5d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000194f50 sp=0xc000194f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000194fe0 sp=0xc000194f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000194fe8 sp=0xc000194fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x2c?, 0x97?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d7f50 sp=0xc0004d7f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d7fe0 sp=0xc0004d7f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d7fe8 sp=0xc0004d7fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle)]: runtime.gopark(0x223548052a9887?, 0x3?, 0x54?, 0x43?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d6f50 sp=0xc0004d6f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d6fe0 sp=0xc0004d6f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d6fe8 sp=0xc0004d6fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x95?, 0xd1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d5f50 sp=0xc0004d5f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d5fe0 sp=0xc0004d5f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d5fe8 sp=0xc0004d5fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 33 [GC worker (idle)]: runtime.gopark(0x22354804e5d34c?, 0x3?, 0x4c?, 0x21?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d4f50 sp=0xc0004d4f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d4fe0 sp=0xc0004d4f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d4fe8 sp=0xc0004d4fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle)]: runtime.gopark(0x223548043968f1?, 0x3?, 0x32?, 0x1a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d3f50 sp=0xc0004d3f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d3fe0 sp=0xc0004d3f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d3fe8 sp=0xc0004d3fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 51 [GC worker (idle)]: runtime.gopark(0x22354804729738?, 0x3?, 0x95?, 0x98?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d2f50 sp=0xc0004d2f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d2fe0 sp=0xc0004d2f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d2fe8 sp=0xc0004d2fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 52 [GC worker (idle)]: runtime.gopark(0x223548047e7148?, 0x3?, 0x73?, 0x7b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d1f50 sp=0xc0004d1f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d1fe0 sp=0xc0004d1f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d1fe8 sp=0xc0004d1fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 53 [GC worker (idle)]: runtime.gopark(0x2235480466df7f?, 0x3?, 0xdd?, 0xa3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d0f50 sp=0xc0004d0f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d0fe0 sp=0xc0004d0f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d0fe8 sp=0xc0004d0fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 54 [GC worker (idle)]: runtime.gopark(0x2235480362af24?, 0x3?, 0x4d?, 0x2f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e1f50 sp=0xc0004e1f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e1fe0 sp=0xc0004e1f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e1fe8 sp=0xc0004e1fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 55 [GC worker (idle)]: runtime.gopark(0x22354803631720?, 0x3?, 0x2d?, 0xf9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e0f50 sp=0xc0004e0f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e0fe0 sp=0xc0004e0f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e0fe8 sp=0xc0004e0fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 56 [GC worker (idle)]: runtime.gopark(0x22354804648527?, 0x3?, 0xd4?, 0x17?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004dff50 sp=0xc0004dff30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004dffe0 sp=0xc0004dff50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004dffe8 sp=0xc0004dffe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 57 [GC worker (idle)]: runtime.gopark(0x22354803631a5e?, 0x3?, 0x7a?, 0xa0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004def50 sp=0xc0004def30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004defe0 sp=0xc0004def50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004defe8 sp=0xc0004defe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 58 [GC worker (idle)]: runtime.gopark(0x22354804729eb8?, 0x3?, 0xc5?, 0x8d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ddf50 sp=0xc0004ddf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ddfe0 sp=0xc0004ddf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ddfe8 sp=0xc0004ddfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 59 [GC worker (idle)]: runtime.gopark(0x223548047604e1?, 0x3?, 0x58?, 0x68?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004dcf50 sp=0xc0004dcf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004dcfe0 sp=0xc0004dcf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004dcfe8 sp=0xc0004dcfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 60 [GC worker (idle)]: runtime.gopark(0x22354804725ef8?, 0x3?, 0x24?, 0x4f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004dbf50 sp=0xc0004dbf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004dbfe0 sp=0xc0004dbf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004dbfe8 sp=0xc0004dbfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 61 [GC worker (idle)]: runtime.gopark(0x22354804731a64?, 0x3?, 0x6c?, 0xa5?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004daf50 sp=0xc0004daf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004dafe0 sp=0xc0004daf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004dafe8 sp=0xc0004dafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 62 [GC worker (idle)]: runtime.gopark(0x22354804f56b90?, 0x3?, 0x2c?, 0xdf?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e9f50 sp=0xc0004e9f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e9fe0 sp=0xc0004e9f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e9fe8 sp=0xc0004e9fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 63 [GC worker (idle)]: runtime.gopark(0x22354804729738?, 0x3?, 0x88?, 0x87?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e8f50 sp=0xc0004e8f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e8fe0 sp=0xc0004e8f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e8fe8 sp=0xc0004e8fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 64 [GC worker (idle)]: runtime.gopark(0x22354804e63f8a?, 0x3?, 0x4b?, 0x15?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e7f50 sp=0xc0004e7f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e7fe0 sp=0xc0004e7f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e7fe8 sp=0xc0004e7fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 65 [GC worker (idle)]: runtime.gopark(0x223548052b6b3b?, 0x1?, 0xf6?, 0xd7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e6f50 sp=0xc0004e6f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e6fe0 sp=0xc0004e6f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e6fe8 sp=0xc0004e6fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle)]: runtime.gopark(0x22354804f6d94e?, 0x3?, 0xe6?, 0xe6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e5f50 sp=0xc0004e5f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e5fe0 sp=0xc0004e5f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e5fe8 sp=0xc0004e5fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle)]: runtime.gopark(0x22354804660d25?, 0x3?, 0xf9?, 0x1f?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e4f50 sp=0xc0004e4f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e4fe0 sp=0xc0004e4f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e4fe8 sp=0xc0004e4fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle)]: runtime.gopark(0x2235480361ccee?, 0x3?, 0xaa?, 0xd8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e3f50 sp=0xc0004e3f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e3fe0 sp=0xc0004e3f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e3fe8 sp=0xc0004e3fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle)]: runtime.gopark(0x22354804873440?, 0x3?, 0xb1?, 0x98?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004e2f50 sp=0xc0004e2f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004e2fe0 sp=0xc0004e2f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004e2fe8 sp=0xc0004e2fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0xf9?, 0xcc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f1f50 sp=0xc0004f1f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004f1fe0 sp=0xc0004f1f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f1fe8 sp=0xc0004f1fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle)]: runtime.gopark(0x223548043b55b7?, 0x3?, 0xac?, 0x13?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f0f50 sp=0xc0004f0f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004f0fe0 sp=0xc0004f0f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f0fe8 sp=0xc0004f0fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x22354804722bd7?, 0x3?, 0xb0?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004eff50 sp=0xc0004eff30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004effe0 sp=0xc0004eff50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004effe8 sp=0xc0004effe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle)]: runtime.gopark(0x2235480362c914?, 0x3?, 0xf?, 0xd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004eef50 sp=0xc0004eef30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004eefe0 sp=0xc0004eef50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004eefe8 sp=0xc0004eefe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle)]: runtime.gopark(0x22354804971ef0?, 0x3?, 0xb5?, 0x93?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004edf50 sp=0xc0004edf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004edfe0 sp=0xc0004edf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004edfe8 sp=0xc0004edfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 45 [GC worker (idle)]: runtime.gopark(0x22354804668a89?, 0x3?, 0xb?, 0xe7?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ecf50 sp=0xc0004ecf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ecfe0 sp=0xc0004ecf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ecfe8 sp=0xc0004ecfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle)]: runtime.gopark(0x223548047e348b?, 0x3?, 0x14?, 0x73?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ebf50 sp=0xc0004ebf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ebfe0 sp=0xc0004ebf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ebfe8 sp=0xc0004ebfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle)]: runtime.gopark(0x22354804faac22?, 0x3?, 0x71?, 0x60?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004eaf50 sp=0xc0004eaf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004eafe0 sp=0xc0004eaf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004eafe8 sp=0xc0004eafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0xa8?, 0xc8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001abf50 sp=0xc0001abf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001abfe0 sp=0xc0001abf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001abfe8 sp=0xc0001abfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 46 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x18?, 0xb3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aaf50 sp=0xc0001aaf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001aafe0 sp=0xc0001aaf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001aafe8 sp=0xc0001aafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x6e?, 0xe1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9f50 sp=0xc0001a9f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a9fe0 sp=0xc0001a9f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a9fe8 sp=0xc0001a9fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 47 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x3d?, 0xba?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8f50 sp=0xc0001a8f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a8fe0 sp=0xc0001a8f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a8fe8 sp=0xc0001a8fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 48 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x2a?, 0x98?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x4?, 0x8f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x9e?, 0x68?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle)]: runtime.gopark(0x2235480467a1a3?, 0x1?, 0xd3?, 0x7a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 77 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x39?, 0x84?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004fdf50 sp=0xc0004fdf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004fdfe0 sp=0xc0004fdf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004fdfe8 sp=0xc0004fdfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 78 [GC worker (idle)]: runtime.gopark(0x223548047db21c?, 0x1?, 0xe6?, 0x8a?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004fcf50 sp=0xc0004fcf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004fcfe0 sp=0xc0004fcf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004fcfe8 sp=0xc0004fcfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle)]: runtime.gopark(0x22354804f7f7b6?, 0x3?, 0x1b?, 0xd0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004fbf50 sp=0xc0004fbf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004fbfe0 sp=0xc0004fbf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004fbfe8 sp=0xc0004fbfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle)]: runtime.gopark(0x22354803612adc?, 0x3?, 0x87?, 0x4b?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004faf50 sp=0xc0004faf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004fafe0 sp=0xc0004faf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004fafe8 sp=0xc0004fafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x68?, 0x2e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f9f50 sp=0xc0004f9f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004f9fe0 sp=0xc0004f9f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f9fe8 sp=0xc0004f9fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle)]: runtime.gopark(0x223548049bba6e?, 0x3?, 0xb9?, 0xc0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f8f50 sp=0xc0004f8f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004f8fe0 sp=0xc0004f8f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f8fe8 sp=0xc0004f8fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 79 [GC worker (idle)]: runtime.gopark(0x22354804959c42?, 0x3?, 0x81?, 0xed?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f7f50 sp=0xc0004f7f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004f7fe0 sp=0xc0004f7f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f7fe8 sp=0xc0004f7fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x40?, 0x53?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f6f50 sp=0xc0004f6f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004f6fe0 sp=0xc0004f6f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f6fe8 sp=0xc0004f6fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 80 [GC worker (idle)]: runtime.gopark(0x22354804771fc5?, 0x3?, 0xf3?, 0x96?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bdf50 sp=0xc0001bdf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bdfe0 sp=0xc0001bdf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bdfe8 sp=0xc0001bdfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 101 [GC worker (idle)]: runtime.gopark(0x2235480475f6d1?, 0x1?, 0x41?, 0xba?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bcf50 sp=0xc0001bcf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bcfe0 sp=0xc0001bcf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bcfe8 sp=0xc0001bcfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 86 [GC worker (idle)]: runtime.gopark(0x2235480527f9ca?, 0x1?, 0xdb?, 0x44?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bbf50 sp=0xc0001bbf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bbfe0 sp=0xc0001bbf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bbfe8 sp=0xc0001bbfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle)]: runtime.gopark(0x22354804766355?, 0x1?, 0x6f?, 0x56?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001baf50 sp=0xc0001baf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bafe0 sp=0xc0001baf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bafe8 sp=0xc0001bafe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 102 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0xc5?, 0x38?, 0x12dd40b?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b9f50 sp=0xc0001b9f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b9fe0 sp=0xc0001b9f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b9fe8 sp=0xc0001b9fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 87 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x49?, 0x9e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b8f50 sp=0xc0001b8f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b8fe0 sp=0xc0001b8f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b8fe8 sp=0xc0001b8fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 103 [GC worker (idle)]: runtime.gopark(0x223548043d96fb?, 0x3?, 0x82?, 0xba?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b7f50 sp=0xc0001b7f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b7fe0 sp=0xc0001b7f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b7fe8 sp=0xc0001b7fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [GC worker (idle)]: runtime.gopark(0x2235480495032c?, 0x3?, 0x9?, 0xc4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b6f50 sp=0xc0001b6f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b6fe0 sp=0xc0001b6f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b6fe8 sp=0xc0001b6fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 88 [GC worker (idle)]: runtime.gopark(0x22354805016814?, 0x3?, 0xa7?, 0x25?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3f50 sp=0xc0001a3f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a3fe0 sp=0xc0001a3f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a3fe8 sp=0xc0001a3fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 89 [GC worker (idle)]: runtime.gopark(0x22354804977396?, 0x3?, 0x2a?, 0xc2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2f50 sp=0xc0001a2f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a2fe0 sp=0xc0001a2f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a2fe8 sp=0xc0001a2fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 115 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0xb5?, 0xae?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a1f50 sp=0xc0001a1f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a1fe0 sp=0xc0001a1f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a1fe8 sp=0xc0001a1fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 104 [GC worker (idle)]: runtime.gopark(0x37c3ba0?, 0x1?, 0x5f?, 0x52?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a0f50 sp=0xc0001a0f30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a0fe0 sp=0xc0001a0f50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a0fe8 sp=0xc0001a0fe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 90 [GC worker (idle)]: runtime.gopark(0x22354804679ec9?, 0x1?, 0xda?, 0xe3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019ff50 sp=0xc00019ff30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019ffe0 sp=0xc00019ff50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019ffe8 sp=0xc00019ffe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 105 [GC worker (idle)]: runtime.gopark(0x223548036316da?, 0x1?, 0x4?, 0x19?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019ef50 sp=0xc00019ef30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019efe0 sp=0xc00019ef50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019efe8 sp=0xc00019efe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 106 [GC worker (idle)]: runtime.gopark(0x2235480467010d?, 0x3?, 0x64?, 0xe9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019df50 sp=0xc00019df30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019dfe0 sp=0xc00019df50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019dfe8 sp=0xc00019dfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 91 [GC worker (idle)]: D0620 03:41:30.517971 1 connection.go:127] sock read failed, closing connection: EOF W0620 03:41:30.518093 949869 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-race-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0620 03:41:30.518230 1 gofer.go:319] All lisafs servers exited. I0620 03:41:30.518284 1 main.go:265] Exiting with status: 0 runtime.gopark(0x37c3ba0?, 0x1?, 0x25?, 0x4d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019cf50 sp=0xc00019cf30 pc=0x12f3016 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019cfe0 sp=0xc00019cf50 pc=0x12d43b1 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019cfe8 sp=0xc00019cfe0 pc=0x1328d61 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 92 [sync.Cond.Wait, 29 minutes]: runtime.gopark(0x133a57a?, 0x132c0d7?, 0xf2?, 0x7f?, 0x132c105?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000144cb0 sp=0xc000144c90 pc=0x12f3016 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc0003dbe30, 0x0) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc000144cf8 sp=0xc000144cb0 pc=0x132470c sync.(*Cond).Wait(0xc0003dbe20) GOROOT/src/sync/cond.go:70 +0xa5 fp=0xc000144d40 sp=0xc000144cf8 pc=0x1338005 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0003db800) pkg/sentry/pgalloc/pgalloc.go:1276 +0x159 fp=0xc000144e08 sp=0xc000144d40 pc=0x1892bb9 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0003db800) pkg/sentry/pgalloc/pgalloc.go:1185 +0x7b fp=0xc000144fc0 sp=0xc000144e08 pc=0x1891fbb gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x3a fp=0xc000144fe0 sp=0xc000144fc0 pc=0x188b73a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000144fe8 sp=0xc000144fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x4a5 goroutine 93 [chan receive, 19 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000595ee0 sp=0xc000595ec0 pc=0x12f3016 runtime.chanrecv(0xc00016c120, 0xc000595fc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x42e fp=0xc000595f70 sp=0xc000595ee0 pc=0x12bf50e runtime.chanrecv2(0xc0003e6a80?, 0x351460?) GOROOT/src/runtime/chan.go:447 +0x18 fp=0xc000595f98 sp=0xc000595f70 pc=0x12bf0b8 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x65 fp=0xc000595fe0 sp=0xc000595f98 pc=0x2063605 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000595fe8 sp=0xc000595fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x536 goroutine 94 [sync.Cond.Wait]: runtime.gopark(0x133a57a?, 0x132c0d7?, 0xf2?, 0x7f?, 0x132c105?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000145cb0 sp=0xc000145c90 pc=0x12f3016 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc000201430, 0x14752) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc000145cf8 sp=0xc000145cb0 pc=0x132470c sync.(*Cond).Wait(0xc000201420) GOROOT/src/sync/cond.go:70 +0xa5 fp=0xc000145d40 sp=0xc000145cf8 pc=0x1338005 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000200e00) pkg/sentry/pgalloc/pgalloc.go:1276 +0x159 fp=0xc000145e08 sp=0xc000145d40 pc=0x1892bb9 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000200e00) pkg/sentry/pgalloc/pgalloc.go:1185 +0x7b fp=0xc000145fc0 sp=0xc000145e08 pc=0x1891fbb gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x3a fp=0xc000145fe0 sp=0xc000145fc0 pc=0x188b73a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000145fe8 sp=0xc000145fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x4a5 goroutine 95 [select]: runtime.gopark(0xc00055ffb0?, 0x2?, 0x0?, 0x20?, 0xc00055fefc?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055fd60 sp=0xc00055fd40 pc=0x12f3016 runtime.selectgo(0xc00055ffb0, 0xc00055fef8, 0xc00055ff00?, 0x0, 0x2?, 0x1) GOROOT/src/runtime/select.go:327 +0x8be fp=0xc00055fec0 sp=0xc00055fd60 pc=0x1304b1e gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x27a fp=0xc00055ffe0 sp=0xc00055fec0 pc=0x1b932ba runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055ffe8 sp=0xc00055ffe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater pkg/sentry/kernel/timekeeper.go:224 +0x15f goroutine 96 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000149d90 sp=0xc000149d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000149de0 sp=0xc000149d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c018, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000149e50 sp=0xc000149de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000149e88 sp=0xc000149e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c000, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000149fb0 sp=0xc000149e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000149fe0 sp=0xc000149fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000149fe8 sp=0xc000149fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 97 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000592d90 sp=0xc000592d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000592de0 sp=0xc000592d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c0a8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000592e50 sp=0xc000592de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000592e88 sp=0xc000592e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c090, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000592fb0 sp=0xc000592e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000592fe0 sp=0xc000592fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000592fe8 sp=0xc000592fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 130 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000591d90 sp=0xc000591d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000591de0 sp=0xc000591d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c138, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000591e50 sp=0xc000591de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000591e88 sp=0xc000591e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c120, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000591fb0 sp=0xc000591e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000591fe0 sp=0xc000591fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000591fe8 sp=0xc000591fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 131 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00052dd90 sp=0xc00052dd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00052dde0 sp=0xc00052dd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c1c8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00052de50 sp=0xc00052dde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00052de88 sp=0xc00052de50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c1b0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00052dfb0 sp=0xc00052de88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00052dfe0 sp=0xc00052dfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00052dfe8 sp=0xc00052dfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 132 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001dfd90 sp=0xc0001dfd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001dfde0 sp=0xc0001dfd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c258, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001dfe50 sp=0xc0001dfde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001dfe88 sp=0xc0001dfe50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c240, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001dffb0 sp=0xc0001dfe88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001dffe0 sp=0xc0001dffb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001dffe8 sp=0xc0001dffe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 133 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001dbd90 sp=0xc0001dbd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001dbde0 sp=0xc0001dbd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c2e8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001dbe50 sp=0xc0001dbde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001dbe88 sp=0xc0001dbe50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c2d0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001dbfb0 sp=0xc0001dbe88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001dbfe0 sp=0xc0001dbfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001dbfe8 sp=0xc0001dbfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 134 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000529d90 sp=0xc000529d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000529de0 sp=0xc000529d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c378, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000529e50 sp=0xc000529de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000529e88 sp=0xc000529e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c360, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000529fb0 sp=0xc000529e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000529fe0 sp=0xc000529fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000529fe8 sp=0xc000529fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 135 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000593d90 sp=0xc000593d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000593de0 sp=0xc000593d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c408, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000593e50 sp=0xc000593de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000593e88 sp=0xc000593e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c3f0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000593fb0 sp=0xc000593e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000593fe0 sp=0xc000593fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000593fe8 sp=0xc000593fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 136 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001dcd90 sp=0xc0001dcd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001dcde0 sp=0xc0001dcd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c498, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001dce50 sp=0xc0001dcde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001dce88 sp=0xc0001dce50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c480, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001dcfb0 sp=0xc0001dce88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001dcfe0 sp=0xc0001dcfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001dcfe8 sp=0xc0001dcfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 137 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00058ed90 sp=0xc00058ed70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00058ede0 sp=0xc00058ed90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c528, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00058ee50 sp=0xc00058ede0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00058ee88 sp=0xc00058ee50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c510, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00058efb0 sp=0xc00058ee88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00058efe0 sp=0xc00058efb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00058efe8 sp=0xc00058efe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 138 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ddd90 sp=0xc0001ddd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001ddde0 sp=0xc0001ddd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c5b8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001dde50 sp=0xc0001ddde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001dde88 sp=0xc0001dde50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c5a0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001ddfb0 sp=0xc0001dde88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001ddfe0 sp=0xc0001ddfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ddfe8 sp=0xc0001ddfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 139 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000594d90 sp=0xc000594d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000594de0 sp=0xc000594d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c648, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000594e50 sp=0xc000594de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000594e88 sp=0xc000594e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c630, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000594fb0 sp=0xc000594e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000594fe0 sp=0xc000594fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000594fe8 sp=0xc000594fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 140 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000793d90 sp=0xc000793d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000793de0 sp=0xc000793d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c6d8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000793e50 sp=0xc000793de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000793e88 sp=0xc000793e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c6c0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000793fb0 sp=0xc000793e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000793fe0 sp=0xc000793fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000793fe8 sp=0xc000793fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 141 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000797d90 sp=0xc000797d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000797de0 sp=0xc000797d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c768, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000797e50 sp=0xc000797de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000797e88 sp=0xc000797e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c750, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000797fb0 sp=0xc000797e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000797fe0 sp=0xc000797fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000797fe8 sp=0xc000797fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 142 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00058fd90 sp=0xc00058fd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00058fde0 sp=0xc00058fd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c7f8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00058fe50 sp=0xc00058fde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00058fe88 sp=0xc00058fe50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c7e0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00058ffb0 sp=0xc00058fe88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00058ffe0 sp=0xc00058ffb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00058ffe8 sp=0xc00058ffe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 143 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00052ad90 sp=0xc00052ad70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00052ade0 sp=0xc00052ad90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c888, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00052ae50 sp=0xc00052ade0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00052ae88 sp=0xc00052ae50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c870, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00052afb0 sp=0xc00052ae88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00052afe0 sp=0xc00052afb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00052afe8 sp=0xc00052afe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 144 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ded90 sp=0xc0001ded70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001dede0 sp=0xc0001ded90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c918, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001dee50 sp=0xc0001dede0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001dee88 sp=0xc0001dee50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c900, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001defb0 sp=0xc0001dee88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001defe0 sp=0xc0001defb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001defe8 sp=0xc0001defe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 145 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001d8d90 sp=0xc0001d8d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001d8de0 sp=0xc0001d8d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041c9a8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001d8e50 sp=0xc0001d8de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001d8e88 sp=0xc0001d8e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041c990, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001d8fb0 sp=0xc0001d8e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001d8fe0 sp=0xc0001d8fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001d8fe8 sp=0xc0001d8fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 146 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00052cd90 sp=0xc00052cd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00052cde0 sp=0xc00052cd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041ca38, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00052ce50 sp=0xc00052cde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00052ce88 sp=0xc00052ce50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041ca20, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00052cfb0 sp=0xc00052ce88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00052cfe0 sp=0xc00052cfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00052cfe8 sp=0xc00052cfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 147 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00052bd90 sp=0xc00052bd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00052bde0 sp=0xc00052bd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cac8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00052be50 sp=0xc00052bde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00052be88 sp=0xc00052be50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cab0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00052bfb0 sp=0xc00052be88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00052bfe0 sp=0xc00052bfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00052bfe8 sp=0xc00052bfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 148 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00060dd90 sp=0xc00060dd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00060dde0 sp=0xc00060dd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cb58, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00060de50 sp=0xc00060dde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00060de88 sp=0xc00060de50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cb40, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00060dfb0 sp=0xc00060de88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00060dfe0 sp=0xc00060dfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00060dfe8 sp=0xc00060dfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 149 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000526d90 sp=0xc000526d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000526de0 sp=0xc000526d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cbe8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000526e50 sp=0xc000526de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000526e88 sp=0xc000526e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cbd0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000526fb0 sp=0xc000526e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000526fe0 sp=0xc000526fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000526fe8 sp=0xc000526fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 150 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001d9d90 sp=0xc0001d9d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001d9de0 sp=0xc0001d9d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cc78, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001d9e50 sp=0xc0001d9de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001d9e88 sp=0xc0001d9e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cc60, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001d9fb0 sp=0xc0001d9e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001d9fe0 sp=0xc0001d9fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001d9fe8 sp=0xc0001d9fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 151 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001dad90 sp=0xc0001dad70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001dade0 sp=0xc0001dad90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cd08, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001dae50 sp=0xc0001dade0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001dae88 sp=0xc0001dae50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041ccf0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001dafb0 sp=0xc0001dae88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001dafe0 sp=0xc0001dafb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001dafe8 sp=0xc0001dafe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 152 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000611d90 sp=0xc000611d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000611de0 sp=0xc000611d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cd98, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000611e50 sp=0xc000611de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000611e88 sp=0xc000611e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cd80, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000611fb0 sp=0xc000611e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000611fe0 sp=0xc000611fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000611fe8 sp=0xc000611fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 153 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000794d90 sp=0xc000794d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000794de0 sp=0xc000794d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041ce28, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000794e50 sp=0xc000794de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000794e88 sp=0xc000794e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041ce10, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000794fb0 sp=0xc000794e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000794fe0 sp=0xc000794fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000794fe8 sp=0xc000794fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 154 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000527d90 sp=0xc000527d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000527de0 sp=0xc000527d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041ceb8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000527e50 sp=0xc000527de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000527e88 sp=0xc000527e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cea0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000527fb0 sp=0xc000527e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000527fe0 sp=0xc000527fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000527fe8 sp=0xc000527fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 155 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000795d90 sp=0xc000795d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000795de0 sp=0xc000795d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cf48, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000795e50 sp=0xc000795de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000795e88 sp=0xc000795e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cf30, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000795fb0 sp=0xc000795e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000795fe0 sp=0xc000795fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000795fe8 sp=0xc000795fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 156 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000528d90 sp=0xc000528d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000528de0 sp=0xc000528d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041cfd8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000528e50 sp=0xc000528de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000528e88 sp=0xc000528e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041cfc0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000528fb0 sp=0xc000528e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000528fe0 sp=0xc000528fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000528fe8 sp=0xc000528fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 157 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000590d90 sp=0xc000590d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000590de0 sp=0xc000590d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d068, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000590e50 sp=0xc000590de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000590e88 sp=0xc000590e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d050, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000590fb0 sp=0xc000590e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000590fe0 sp=0xc000590fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000590fe8 sp=0xc000590fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 158 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e7d90 sp=0xc0001e7d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e7de0 sp=0xc0001e7d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d0f8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e7e50 sp=0xc0001e7de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e7e88 sp=0xc0001e7e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d0e0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e7fb0 sp=0xc0001e7e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e7fe0 sp=0xc0001e7fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e7fe8 sp=0xc0001e7fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 159 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00060ed90 sp=0xc00060ed70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00060ede0 sp=0xc00060ed90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d188, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00060ee50 sp=0xc00060ede0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00060ee88 sp=0xc00060ee50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d170, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00060efb0 sp=0xc00060ee88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00060efe0 sp=0xc00060efb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00060efe8 sp=0xc00060efe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 160 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000796d90 sp=0xc000796d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000796de0 sp=0xc000796d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d218, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000796e50 sp=0xc000796de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000796e88 sp=0xc000796e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d200, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000796fb0 sp=0xc000796e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000796fe0 sp=0xc000796fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000796fe8 sp=0xc000796fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 161 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00060fd90 sp=0xc00060fd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00060fde0 sp=0xc00060fd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d2a8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00060fe50 sp=0xc00060fde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00060fe88 sp=0xc00060fe50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d290, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00060ffb0 sp=0xc00060fe88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00060ffe0 sp=0xc00060ffb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00060ffe8 sp=0xc00060ffe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 162 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000790d90 sp=0xc000790d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000790de0 sp=0xc000790d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d338, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000790e50 sp=0xc000790de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000790e88 sp=0xc000790e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d320, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000790fb0 sp=0xc000790e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000790fe0 sp=0xc000790fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000790fe8 sp=0xc000790fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 163 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e3d90 sp=0xc0001e3d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e3de0 sp=0xc0001e3d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d3c8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e3e50 sp=0xc0001e3de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e3e88 sp=0xc0001e3e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d3b0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e3fb0 sp=0xc0001e3e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e3fe0 sp=0xc0001e3fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e3fe8 sp=0xc0001e3fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 164 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000610d90 sp=0xc000610d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000610de0 sp=0xc000610d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d458, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000610e50 sp=0xc000610de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000610e88 sp=0xc000610e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d440, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000610fb0 sp=0xc000610e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000610fe0 sp=0xc000610fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000610fe8 sp=0xc000610fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 165 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00059dd90 sp=0xc00059dd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00059dde0 sp=0xc00059dd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d4e8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00059de50 sp=0xc00059dde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00059de88 sp=0xc00059de50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d4d0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00059dfb0 sp=0xc00059de88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00059dfe0 sp=0xc00059dfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00059dfe8 sp=0xc00059dfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 166 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00060ad90 sp=0xc00060ad70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00060ade0 sp=0xc00060ad90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d578, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00060ae50 sp=0xc00060ade0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00060ae88 sp=0xc00060ae50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d560, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00060afb0 sp=0xc00060ae88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00060afe0 sp=0xc00060afb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00060afe8 sp=0xc00060afe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 167 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00060bd90 sp=0xc00060bd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00060bde0 sp=0xc00060bd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d608, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00060be50 sp=0xc00060bde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00060be88 sp=0xc00060be50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d5f0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00060bfb0 sp=0xc00060be88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00060bfe0 sp=0xc00060bfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00060bfe8 sp=0xc00060bfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 168 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001efd90 sp=0xc0001efd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001efde0 sp=0xc0001efd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d698, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001efe50 sp=0xc0001efde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001efe88 sp=0xc0001efe50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d680, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001effb0 sp=0xc0001efe88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001effe0 sp=0xc0001effb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001effe8 sp=0xc0001effe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 169 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00060cd90 sp=0xc00060cd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00060cde0 sp=0xc00060cd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d728, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00060ce50 sp=0xc00060cde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00060ce88 sp=0xc00060ce50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d710, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00060cfb0 sp=0xc00060ce88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00060cfe0 sp=0xc00060cfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00060cfe8 sp=0xc00060cfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 170 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e4d90 sp=0xc0001e4d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e4de0 sp=0xc0001e4d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d7b8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e4e50 sp=0xc0001e4de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e4e88 sp=0xc0001e4e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d7a0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e4fb0 sp=0xc0001e4e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e4fe0 sp=0xc0001e4fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e4fe8 sp=0xc0001e4fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 171 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000599d90 sp=0xc000599d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000599de0 sp=0xc000599d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d848, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000599e50 sp=0xc000599de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000599e88 sp=0xc000599e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d830, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000599fb0 sp=0xc000599e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000599fe0 sp=0xc000599fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000599fe8 sp=0xc000599fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 172 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000791d90 sp=0xc000791d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000791de0 sp=0xc000791d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d8d8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000791e50 sp=0xc000791de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000791e88 sp=0xc000791e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d8c0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000791fb0 sp=0xc000791e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000791fe0 sp=0xc000791fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000791fe8 sp=0xc000791fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 173 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e5d90 sp=0xc0001e5d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e5de0 sp=0xc0001e5d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d968, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e5e50 sp=0xc0001e5de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e5e88 sp=0xc0001e5e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d950, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e5fb0 sp=0xc0001e5e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e5fe0 sp=0xc0001e5fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e5fe8 sp=0xc0001e5fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 174 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000615d90 sp=0xc000615d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000615de0 sp=0xc000615d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041d9f8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000615e50 sp=0xc000615de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000615e88 sp=0xc000615e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041d9e0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000615fb0 sp=0xc000615e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000615fe0 sp=0xc000615fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000615fe8 sp=0xc000615fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 175 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ebd90 sp=0xc0001ebd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001ebde0 sp=0xc0001ebd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041da88, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001ebe50 sp=0xc0001ebde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001ebe88 sp=0xc0001ebe50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041da70, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001ebfb0 sp=0xc0001ebe88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001ebfe0 sp=0xc0001ebfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ebfe8 sp=0xc0001ebfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 176 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000792d90 sp=0xc000792d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000792de0 sp=0xc000792d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041db18, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000792e50 sp=0xc000792de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000792e88 sp=0xc000792e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041db00, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000792fb0 sp=0xc000792e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000792fe0 sp=0xc000792fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000792fe8 sp=0xc000792fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 177 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000619d90 sp=0xc000619d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000619de0 sp=0xc000619d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041dba8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000619e50 sp=0xc000619de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000619e88 sp=0xc000619e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041db90, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc000619fb0 sp=0xc000619e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc000619fe0 sp=0xc000619fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000619fe8 sp=0xc000619fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 178 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e6d90 sp=0xc0001e6d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e6de0 sp=0xc0001e6d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041dc38, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e6e50 sp=0xc0001e6de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e6e88 sp=0xc0001e6e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041dc20, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e6fb0 sp=0xc0001e6e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e6fe0 sp=0xc0001e6fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e6fe8 sp=0xc0001e6fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 179 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e1d90 sp=0xc0001e1d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e1de0 sp=0xc0001e1d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041dcc8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e1e50 sp=0xc0001e1de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e1e88 sp=0xc0001e1e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041dcb0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e1fb0 sp=0xc0001e1e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e1fe0 sp=0xc0001e1fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e1fe8 sp=0xc0001e1fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 180 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e0d90 sp=0xc0001e0d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e0de0 sp=0xc0001e0d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041dd58, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e0e50 sp=0xc0001e0de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e0e88 sp=0xc0001e0e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041dd40, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e0fb0 sp=0xc0001e0e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e0fe0 sp=0xc0001e0fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e0fe8 sp=0xc0001e0fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 181 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00059ad90 sp=0xc00059ad70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00059ade0 sp=0xc00059ad90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041dde8, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00059ae50 sp=0xc00059ade0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00059ae88 sp=0xc00059ae50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041ddd0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00059afb0 sp=0xc00059ae88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00059afe0 sp=0xc00059afb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00059afe8 sp=0xc00059afe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 182 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ecd90 sp=0xc0001ecd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001ecde0 sp=0xc0001ecd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041de78, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001ece50 sp=0xc0001ecde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001ece88 sp=0xc0001ece50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041de60, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001ecfb0 sp=0xc0001ece88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001ecfe0 sp=0xc0001ecfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ecfe8 sp=0xc0001ecfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 183 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001e2d90 sp=0xc0001e2d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc0001e2de0 sp=0xc0001e2d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041df08, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc0001e2e50 sp=0xc0001e2de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc0001e2e88 sp=0xc0001e2e50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041def0, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc0001e2fb0 sp=0xc0001e2e88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc0001e2fe0 sp=0xc0001e2fb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001e2fe8 sp=0xc0001e2fe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 184 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00059bd90 sp=0xc00059bd70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc00059bde0 sp=0xc00059bd90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041df98, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc00059be50 sp=0xc00059bde0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc00059be88 sp=0xc00059be50 pc=0x1c268b9 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:279 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00041df80, 0xc000788678) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x12a fp=0xc00059bfb0 sp=0xc00059be88 pc=0x1c5632a gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.func2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x48 fp=0xc00059bfe0 sp=0xc00059bfb0 pc=0x1c56ca8 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00059bfe8 sp=0xc00059bfe0 pc=0x1328d61 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init pkg/tcpip/transport/tcp/dispatcher.go:391 +0x1f2 goroutine 185 [select, 29 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000596d90 sp=0xc000596d70 pc=0x12f3016 gvisor.dev/gvisor/pkg/sync.Gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) pkg/sync/runtime_unsafe.go:41 +0x4e fp=0xc000596de0 sp=0xc000596d90 pc=0x149d06e gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00041e028, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:209 +0x105 fp=0xc000596e50 sp=0xc000596de0 pc=0x1c266c5 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0x0?, 0x0?, 0x0?) pkg/sleep/sleep_unsafe.go:256 +0x39 fp=0xc000596e88 sp=0xc000596e50 pc=0x1c268b9 g VM DIAGNOSIS: I0620 03:41:29.308539 17024 main.go:230] *************************** I0620 03:41:29.308650 17024 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0620 03:41:29.308735 17024 main.go:232] Version 0.0.0 I0620 03:41:29.308770 17024 main.go:233] GOOS: linux I0620 03:41:29.308821 17024 main.go:234] GOARCH: amd64 I0620 03:41:29.308855 17024 main.go:235] PID: 17024 I0620 03:41:29.308912 17024 main.go:236] UID: 0, GID: 0 I0620 03:41:29.308980 17024 main.go:237] Configuration: I0620 03:41:29.309031 17024 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0620 03:41:29.309081 17024 main.go:239] Platform: systrap I0620 03:41:29.309116 17024 main.go:240] FileAccess: shared I0620 03:41:29.309157 17024 main.go:241] Directfs: true I0620 03:41:29.309189 17024 main.go:242] Overlay: none I0620 03:41:29.309221 17024 main.go:243] Network: sandbox, logging: false I0620 03:41:29.309257 17024 main.go:244] Strace: false, max size: 1024, syscalls: I0620 03:41:29.309293 17024 main.go:245] IOURING: false I0620 03:41:29.309327 17024 main.go:246] Debug: true I0620 03:41:29.309359 17024 main.go:247] Systemd: false I0620 03:41:29.309397 17024 main.go:248] *************************** W0620 03:41:29.309437 17024 main.go:253] Block the TERM signal. This is only safe in tests! D0620 03:41:29.309547 17024 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0620 03:41:29.315891 17024 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-1", PID: 949939 Found sandbox "ci-gvisor-systrap-1-race-1", PID: 949939 I0620 03:41:29.316005 17024 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0620 03:41:29.316042 17024 sandbox.go:1321] Stacks sandbox "ci-gvisor-systrap-1-race-1" D0620 03:41:29.316090 17024 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0620 03:41:29.316504 17024 urpc.go:568] urpc: successfully marshalled 36 bytes. W0620 03:41:30.458354 17024 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0620 03:41:30.458698 17024 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-1"]: exit status 128 I0620 03:41:29.308539 17024 main.go:230] *************************** I0620 03:41:29.308650 17024 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0620 03:41:29.308735 17024 main.go:232] Version 0.0.0 I0620 03:41:29.308770 17024 main.go:233] GOOS: linux I0620 03:41:29.308821 17024 main.go:234] GOARCH: amd64 I0620 03:41:29.308855 17024 main.go:235] PID: 17024 I0620 03:41:29.308912 17024 main.go:236] UID: 0, GID: 0 I0620 03:41:29.308980 17024 main.go:237] Configuration: I0620 03:41:29.309031 17024 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0620 03:41:29.309081 17024 main.go:239] Platform: systrap I0620 03:41:29.309116 17024 main.go:240] FileAccess: shared I0620 03:41:29.309157 17024 main.go:241] Directfs: true I0620 03:41:29.309189 17024 main.go:242] Overlay: none I0620 03:41:29.309221 17024 main.go:243] Network: sandbox, logging: false I0620 03:41:29.309257 17024 main.go:244] Strace: false, max size: 1024, syscalls: I0620 03:41:29.309293 17024 main.go:245] IOURING: false I0620 03:41:29.309327 17024 main.go:246] Debug: true I0620 03:41:29.309359 17024 main.go:247] Systemd: false I0620 03:41:29.309397 17024 main.go:248] *************************** W0620 03:41:29.309437 17024 main.go:253] Block the TERM signal. This is only safe in tests! D0620 03:41:29.309547 17024 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0620 03:41:29.315891 17024 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-1", PID: 949939 Found sandbox "ci-gvisor-systrap-1-race-1", PID: 949939 I0620 03:41:29.316005 17024 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0620 03:41:29.316042 17024 sandbox.go:1321] Stacks sandbox "ci-gvisor-systrap-1-race-1" D0620 03:41:29.316090 17024 sandbox.go:606] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0620 03:41:29.316504 17024 urpc.go:568] urpc: successfully marshalled 36 bytes. W0620 03:41:30.458354 17024 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-1" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0620 03:41:30.458698 17024 main.go:274] Failure to execute command, err: 1 [9527396.050218] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527402.908963] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527402.948171] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527403.005709] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527403.006059] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527406.908163] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527406.951184] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527407.000761] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527412.502264] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527412.552378] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527412.586296] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527414.835024] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527414.892766] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527414.966763] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527423.125619] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527423.166895] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527423.204375] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527424.904087] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527424.944678] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527424.967075] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527425.014092] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527425.036128] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527426.809302] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527426.863290] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527432.528196] warn_bad_vsyscall: 34 callbacks suppressed [9527432.528200] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527432.604118] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527432.644922] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527441.425428] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527441.487819] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527441.509634] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527460.459488] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527460.498641] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527460.544914] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527463.842279] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527463.883812] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527463.926160] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527463.972417] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527464.019971] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527464.061952] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527464.083946] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527466.629432] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527466.678230] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527466.724935] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527467.608732] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527467.658608] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527467.694550] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527467.732248] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527475.675640] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527475.717511] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527475.740493] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527475.783383] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527481.696646] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527481.740466] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527481.762243] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527481.848756] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527490.666786] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527490.713385] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527490.734245] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527490.783343] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527490.794285] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527492.597393] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527492.645086] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527492.690121] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527504.119520] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527504.160414] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527504.200302] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527504.221625] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527507.386900] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527507.442288] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527507.492407] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527510.036594] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527510.078290] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527510.100570] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527510.139200] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527525.034649] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527525.084735] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527525.121888] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527525.537175] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527525.575171] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527525.621596] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.377373] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.428864] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.453522] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.518687] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.549957] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.702666] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.745575] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.781959] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527530.853546] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527530.876426] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527545.101694] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527545.145559] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527545.186971] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527549.419576] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527549.466312] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527549.505149] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527571.163320] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527571.212520] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527571.250391] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527572.856269] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527572.902793] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527572.939780] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527572.960779] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527578.465598] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527578.521718] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527578.563062] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527578.563161] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527581.557082] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527581.600133] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527589.260908] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527589.317067] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527589.353254] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527593.753646] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527593.802358] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527593.823122] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527593.857263] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527605.245020] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527605.294265] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527605.294270] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527605.358420] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527611.982596] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527612.023258] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527612.066567] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527614.173014] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527614.222885] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527614.261322] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527614.261491] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527626.553564] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527626.591573] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527626.591721] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527626.655483] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527626.974717] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527627.009150] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527627.030683] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527627.074606] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527640.453360] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527641.263220] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527642.178626] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527645.901575] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527645.962552] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527645.963209] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527646.054992] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527646.086170] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527647.181666] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527647.229259] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527647.231778] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527647.306701] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527652.454177] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527652.496738] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527652.539173] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527661.908664] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527661.958853] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527661.996349] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527662.573551] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527662.616631] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527662.638618] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527662.692186] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527677.065623] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527677.103511] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527677.158463] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527679.229566] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527679.294118] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527679.337302] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527683.325609] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527683.377126] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527683.426849] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527683.426987] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527688.007877] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527688.045411] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527688.086431] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527688.110352] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527688.291471] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527688.335558] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527688.372505] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527688.425321] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527690.279358] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527690.327187] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527690.366420] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527698.757254] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527698.815531] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527698.837771] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527698.885658] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527699.803083] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527699.845150] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527699.894956] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527709.898749] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527709.950594] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527709.994349] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527713.235062] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527713.278098] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527713.301036] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527713.345568] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527713.346314] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527715.442446] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527715.484714] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527715.529582] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527715.551090] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527728.385436] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527728.456782] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527728.522507] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527729.651615] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527729.692270] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527729.740093] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527755.855137] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527755.893690] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527755.937734] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527756.388960] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527756.423278] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527756.423590] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527756.494925] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527762.954666] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527763.001887] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527763.045408] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527764.483816] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527764.537877] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527764.595197] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527766.915391] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527766.953931] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527766.994572] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527768.403917] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527768.472726] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527768.518263] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527781.322914] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527781.377987] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527781.430263] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527790.545231] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527790.588578] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527790.589880] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527790.643159] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527816.246536] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527816.284725] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527816.310283] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527816.361257] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527816.362360] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527817.413463] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527817.460218] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527817.509332] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527822.457164] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527822.523435] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527822.578558] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527822.602139] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527827.804349] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527827.844655] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527827.899273] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527830.240716] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527830.278297] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527830.318815] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527831.592351] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527831.634109] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527831.656171] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527831.692278] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527842.504298] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527842.551451] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527842.592584] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527843.763305] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527843.801552] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527843.846269] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527843.847033] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527849.532695] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527849.571768] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527849.615338] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527851.237105] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527851.295870] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527851.334209] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527852.494977] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527852.537290] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527852.577641] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527859.326847] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527859.389585] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527859.443281] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527860.600585] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527860.656499] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527860.694632] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527860.717192] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527862.529427] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527862.588983] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527862.610570] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527870.223177] warn_bad_vsyscall: 1 callbacks suppressed [9527870.223181] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527870.282041] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527870.323481] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527870.349472] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527873.204497] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527873.256143] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527873.321871] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527884.696142] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527884.739250] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527884.760279] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527884.801836] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527887.800237] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527887.872572] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527887.940817] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527894.580348] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527894.645270] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527894.710189] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527904.397185] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527904.447296] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527904.507900] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527904.532166] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527904.974076] exe[18731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f28092686 cs:33 sp:7ea07f66f8e8 ax:ffffffffff600000 si:7ea07f66fe08 di:ffffffffff600000 [9527905.088721] exe[973870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f28092686 cs:33 sp:7ea07f66f8e8 ax:ffffffffff600000 si:7ea07f66fe08 di:ffffffffff600000 [9527905.112744] exe[971393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f28092686 cs:33 sp:7ea07f66f8e8 ax:ffffffffff600000 si:7ea07f66fe08 di:ffffffffff600000 [9527905.139716] exe[971260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f28092686 cs:33 sp:7ea07f66f8e8 ax:ffffffffff600000 si:7ea07f66fe08 di:ffffffffff600000 [9527905.162527] exe[973870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f28092686 cs:33 sp:7ea07f66f8e8 ax:ffffffffff600000 si:7ea07f66fe08 di:ffffffffff600000 [9527905.186178] exe[971232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f28092686 cs:33 sp:7ea07f66f8e8 ax:ffffffffff600000 si:7ea07f66fe08 di:ffffffffff600000 [9527911.648222] warn_bad_vsyscall: 33 callbacks suppressed [9527911.648226] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527911.697405] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527911.735099] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527913.039586] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527913.097046] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527913.098216] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527913.166390] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527914.909004] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527914.955045] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527915.004516] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527918.936953] warn_bad_vsyscall: 1 callbacks suppressed [9527918.936957] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527918.988644] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527919.039340] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527919.481028] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527919.525783] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527919.563759] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527925.425198] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527925.469031] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9527925.510596] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527933.740578] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527933.782338] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.804013] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.827302] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.847941] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.868612] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.889882] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.911280] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.932000] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527933.954649] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527946.046942] warn_bad_vsyscall: 61 callbacks suppressed [9527946.046946] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.105102] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.126829] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.148234] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.169341] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.191084] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.212154] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.233743] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.256226] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527946.277586] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527951.196455] warn_bad_vsyscall: 64 callbacks suppressed [9527951.196460] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527951.243776] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527951.295805] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527953.312060] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527953.361849] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527953.398804] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527953.420199] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527959.866589] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527959.906826] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527959.946224] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527966.247446] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527966.295833] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527966.339634] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527966.870507] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527966.937228] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527966.992273] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527970.838051] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527970.889284] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527970.911062] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527970.933317] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527971.358745] warn_bad_vsyscall: 31 callbacks suppressed [9527971.358749] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527971.409428] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527971.418286] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9527971.473104] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527972.322738] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527972.362908] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527972.402824] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527973.089957] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527973.138820] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527973.181410] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527999.276563] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527999.315254] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527999.361591] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9527999.383503] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528004.288187] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528004.328258] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528004.373130] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528006.213096] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528006.276609] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528006.329647] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528008.122108] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528008.178013] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528008.222693] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528016.919868] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528016.970052] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528017.010755] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528021.533256] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528021.574981] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528021.611250] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528028.941688] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528028.981546] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528029.019978] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528029.062321] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528029.104332] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528029.151886] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528039.498700] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528039.543032] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528039.586091] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.158168] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.192926] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.214649] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.252865] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.274399] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.591169] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.637728] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528045.661316] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528045.727945] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528047.621958] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528051.989944] warn_bad_vsyscall: 3 callbacks suppressed [9528051.989948] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528052.035827] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528052.081805] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528057.241409] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528057.308703] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528057.369112] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528057.391271] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528059.321538] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528059.370573] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528059.434849] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528063.486991] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528063.536200] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528063.594317] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528068.658595] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528068.710405] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528068.729720] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528068.768728] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528079.775838] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528079.825881] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528079.876259] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528080.240925] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528080.297648] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528080.354433] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.292256] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.351287] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.374210] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.427528] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.429016] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528102.748755] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.787652] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.822915] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528102.845720] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528109.385499] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528109.422162] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528109.466821] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528115.483900] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528115.536729] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528115.558216] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528115.600497] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528118.256099] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528118.392018] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528118.498254] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.592705] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.639165] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.659909] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.680664] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.704184] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.726182] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.748205] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.769785] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.790594] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528120.811290] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528137.821342] warn_bad_vsyscall: 99 callbacks suppressed [9528137.821346] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528137.866895] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528137.917161] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528137.938958] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528138.148075] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528138.194181] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528138.258450] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528152.215498] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528152.253991] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528152.289936] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528152.312734] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528189.519581] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528189.570532] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528189.616431] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528192.132775] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528192.183682] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528192.184020] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528192.245296] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528199.014094] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528199.090300] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528199.125565] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528205.849946] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528205.906687] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528205.953621] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528207.271743] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528207.328509] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528207.388528] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528227.432125] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528227.475178] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528227.496462] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528227.545976] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528234.167144] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528234.205842] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528234.252629] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528234.283451] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528251.455177] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528251.499441] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528251.543557] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528276.355576] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528276.406457] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528276.469561] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528276.470201] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528278.615320] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528278.697710] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528278.753226] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528280.304594] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528280.341777] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528280.363892] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528284.876015] warn_bad_vsyscall: 1 callbacks suppressed [9528284.876019] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528284.956068] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528284.978248] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528285.029971] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528286.555550] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528286.596959] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528286.620232] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528286.665101] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528286.666031] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528291.413339] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528291.459226] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528291.501002] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528291.524498] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528294.854860] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528294.906017] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528294.950002] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528316.554138] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528316.598268] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528316.635882] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528323.955687] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528324.006142] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528324.052527] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528324.052692] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528324.590820] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528324.629538] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528324.652944] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528324.709816] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528333.310224] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528333.353111] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528333.375208] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528333.422876] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528333.445145] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528337.817013] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528337.863249] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528337.902354] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528346.744223] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528346.825651] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528346.889633] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528351.098412] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528351.151788] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528351.220100] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528352.621036] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528352.677073] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528352.716973] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528365.692358] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528365.734972] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528365.757028] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528365.816751] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528377.897089] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528377.944826] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528377.996716] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528378.019703] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528379.150823] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528379.203965] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528379.249159] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528385.872239] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528385.928331] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528385.976427] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528385.997158] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528386.688107] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528386.728886] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528386.767054] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528388.349957] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528388.401903] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528388.483203] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.705246] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.744693] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.768421] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.811607] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.852314] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.888783] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.929725] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528392.930274] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.555883] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528405.604615] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.625237] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.649592] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.673625] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.697092] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.719812] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.741275] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.764631] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528405.787360] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528434.601873] warn_bad_vsyscall: 61 callbacks suppressed [9528434.601877] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528434.659559] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528434.721617] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528447.791286] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528447.847067] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528447.881135] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528453.162502] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528453.222436] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528453.263494] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528456.285517] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528456.342184] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528456.364158] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528456.401682] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528460.155974] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528460.196554] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528460.233599] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528461.929723] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528461.984142] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528462.030001] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528462.054899] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528469.092841] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528469.140514] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528469.193331] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528480.461614] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528480.508723] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528480.560439] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528507.572821] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528507.798375] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528508.004424] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528508.025445] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528515.016113] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528515.061273] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528515.101760] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528517.727339] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528517.788378] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528517.828646] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528520.795768] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528520.850064] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528520.900097] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.369613] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.420697] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.444137] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528531.484352] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.506965] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.528317] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.548890] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.571690] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.594629] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528531.616115] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528545.425431] warn_bad_vsyscall: 36 callbacks suppressed [9528545.425435] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528545.469002] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528545.511550] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528545.531330] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528546.756439] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528546.824388] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528546.876825] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528546.877066] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528548.353771] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528548.398536] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528553.956017] warn_bad_vsyscall: 9 callbacks suppressed [9528553.956022] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528553.999491] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528554.036967] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528563.072626] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528563.153998] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528563.207806] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528566.086310] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528566.167243] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528566.206347] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528567.580905] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528567.625677] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528567.664055] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528570.849142] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528570.924353] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528570.979495] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528584.239266] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528584.280680] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528584.302313] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528584.343282] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528594.582887] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528594.641226] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528594.705873] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528602.175231] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528602.233188] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528602.278981] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528602.300380] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528603.217685] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528603.281859] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528603.321145] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528608.328656] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528608.428584] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528608.456659] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528608.539139] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528622.634759] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528622.708585] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528622.753522] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528623.962595] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528624.021846] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528624.044847] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528624.083421] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528624.107660] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.015009] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.069616] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.090401] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.134654] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.155722] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.784750] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.825123] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528634.869519] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528638.866038] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528638.903210] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528644.363134] warn_bad_vsyscall: 2 callbacks suppressed [9528644.363138] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528644.419570] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528644.419748] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528644.479027] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528647.169331] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528647.218985] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528647.278592] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528655.288142] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528655.338572] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528655.382644] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528668.697400] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528668.759714] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528668.825978] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528668.847680] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528681.037506] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528681.097160] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528681.139694] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528681.162740] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb78e8 ax:ffffffffff600000 si:7ef598cb7e08 di:ffffffffff600000 [9528681.320164] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528681.369618] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528681.444218] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528691.404070] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528691.450744] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528691.488572] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528699.300344] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528699.335399] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528699.377352] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.399401] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.421375] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.444497] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.465203] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.486651] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.508023] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528699.529865] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528715.038997] warn_bad_vsyscall: 60 callbacks suppressed [9528715.039000] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528715.085240] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528715.135420] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528723.998695] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528724.048157] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528724.099739] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528724.100112] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528728.528705] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528728.570391] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528728.615310] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528733.330378] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528733.382726] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528733.420285] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528733.841319] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528733.898680] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528733.939068] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528733.939161] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528737.580796] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528737.643216] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528737.679460] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.050789] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.130221] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.175265] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.175560] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528752.407812] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.460675] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528752.499382] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.500743] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528752.623628] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528752.667723] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528761.639469] warn_bad_vsyscall: 2 callbacks suppressed [9528761.639473] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528761.690679] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528761.733234] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528762.462578] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528762.497896] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528762.531508] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528766.707981] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528766.752169] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528766.795501] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528766.817444] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528768.507627] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528768.556749] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528768.557457] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528768.609856] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528773.802857] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528773.841254] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528773.841671] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528773.902910] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528774.191977] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528774.223909] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528774.245688] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528774.289276] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528774.310837] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528775.026848] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528781.107649] warn_bad_vsyscall: 8 callbacks suppressed [9528781.107653] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528781.150590] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528781.194718] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528798.321036] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528798.367053] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528798.390235] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528798.429982] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528800.825233] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528800.869887] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528800.902189] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528802.392104] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528802.438696] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528802.482382] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528815.445453] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528815.487469] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528815.510265] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9528815.568144] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528824.656828] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528824.697137] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528824.753556] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528836.825996] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528836.863782] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528836.907772] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528836.933795] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528839.137857] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528839.181682] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528839.203603] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528839.249957] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528840.975474] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528841.031233] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528846.423896] warn_bad_vsyscall: 2 callbacks suppressed [9528846.423900] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528846.470732] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528846.504852] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528846.526635] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528847.194659] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528847.246938] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528847.267745] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528847.289285] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528847.310910] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528847.332420] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528856.944854] warn_bad_vsyscall: 29 callbacks suppressed [9528856.944858] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528857.010024] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528857.031548] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528857.085247] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528881.893818] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528881.946063] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528881.987038] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528890.200045] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528890.265026] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528890.308536] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528890.329976] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528897.936523] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528897.990354] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.012632] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.062796] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.084847] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.463353] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.506784] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.506922] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528898.573349] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528898.594422] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528906.499488] warn_bad_vsyscall: 10 callbacks suppressed [9528906.499492] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528906.545505] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528906.593268] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528906.616369] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528913.534379] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528913.580430] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528913.616152] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528918.907764] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528918.943564] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528918.943750] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528919.008364] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528923.407817] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528923.445643] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528923.495823] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528923.516702] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528925.678057] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528925.715983] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528925.761342] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528925.783226] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528952.550167] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528952.583605] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528952.616334] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528962.692224] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528962.737297] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528962.783414] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528970.248013] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528970.282143] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528970.346882] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528971.073992] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528971.107943] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528971.129041] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528971.180779] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528971.202508] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528974.012918] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528974.081823] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528980.529245] warn_bad_vsyscall: 1 callbacks suppressed [9528980.529249] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528980.607375] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528981.225473] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528981.289966] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528981.333141] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528985.274534] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528985.331374] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528985.355587] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528985.402997] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528997.333472] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528997.376128] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528997.414983] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528997.415601] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528997.987524] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528998.032256] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9528998.033066] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9528998.092688] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529000.182792] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529000.232661] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529012.851809] warn_bad_vsyscall: 1 callbacks suppressed [9529012.851813] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529012.929846] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529012.972445] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529013.315144] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529014.183434] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529015.051340] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529022.895359] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529022.950222] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529022.973087] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529023.021863] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529023.558269] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529023.596324] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529023.654081] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529033.565836] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529033.601027] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529033.623106] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529033.665414] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529033.689080] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529034.602793] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529034.637657] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529034.682027] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.841373] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.881439] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.902434] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.924380] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.946005] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.967609] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529042.988580] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529043.010424] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529043.031408] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529043.052955] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.090758] warn_bad_vsyscall: 61 callbacks suppressed [9529058.090762] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.137470] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.174675] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.710264] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.754471] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.797920] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529058.798485] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529071.995770] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529072.049600] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529072.092956] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529072.116082] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c978e8 ax:ffffffffff600000 si:7ef598c97e08 di:ffffffffff600000 [9529075.052437] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529075.093486] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529075.114564] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529075.149301] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.596335] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.635161] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.656881] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.677595] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.699562] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.720348] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.741828] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.762583] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.783151] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529080.804475] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529087.414274] warn_bad_vsyscall: 29 callbacks suppressed [9529087.414277] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529087.484428] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529087.530462] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529087.530557] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529088.284890] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529088.328153] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529088.373348] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529089.914564] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529089.985048] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529090.049390] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529102.619435] warn_bad_vsyscall: 4 callbacks suppressed [9529102.619438] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529102.668105] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529102.690572] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529102.737741] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.362842] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.412674] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.449885] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.471342] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529122.622304] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.682320] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.707706] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529122.744417] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529136.748179] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529136.780734] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529136.806906] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529136.853858] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529145.467041] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529145.516522] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529145.560255] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529145.560380] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529147.965160] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529148.022693] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529148.060480] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529159.422287] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529159.495726] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529159.538992] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529182.878681] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529182.929643] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529182.951686] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529183.005555] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529188.811587] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529188.881129] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529188.922166] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529214.438042] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529214.483600] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529214.506287] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529214.541469] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529214.541708] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529215.014565] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529215.055752] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529215.111109] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529221.665022] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529221.732576] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529221.785734] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529236.393865] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529236.444313] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529236.466015] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529236.531095] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529237.988948] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529238.040679] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529238.061942] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529238.082802] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529238.103147] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529238.123856] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529245.272111] warn_bad_vsyscall: 29 callbacks suppressed [9529245.272114] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529245.335892] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529245.391460] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529253.539345] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.593134] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.614066] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.634846] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.657086] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.679099] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.701886] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.725536] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.746608] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529253.768048] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529280.478682] warn_bad_vsyscall: 64 callbacks suppressed [9529280.478686] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529280.624103] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529280.696639] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529280.719938] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529343.351912] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529343.432887] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529343.498720] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529362.347851] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529362.395766] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529362.421629] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598c968e8 ax:ffffffffff600000 si:7ef598c96e08 di:ffffffffff600000 [9529362.474220] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529362.813164] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529362.856870] exe[950536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529362.911228] exe[950524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529363.371046] exe[951878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cd98e8 ax:ffffffffff600000 si:7ef598cd9e08 di:ffffffffff600000 [9529363.426985] exe[956307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529363.449787] exe[951264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd20aa2686 cs:33 sp:7ef598cb88e8 ax:ffffffffff600000 si:7ef598cb8e08 di:ffffffffff600000 [9529508.195026] warn_bad_vsyscall: 10 callbacks suppressed [9529508.195029] exe[38827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638e01a8686 cs:33 sp:7f9b9d3798e8 ax:ffffffffff600000 si:7f9b9d379e08 di:ffffffffff600000 [9529508.301003] exe[981819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638e01a8686 cs:33 sp:7f9b9d3798e8 ax:ffffffffff600000 si:7f9b9d379e08 di:ffffffffff600000 [9529508.342725] exe[985799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638e01a8686 cs:33 sp:7f9b9d3378e8 ax:ffffffffff600000 si:7f9b9d337e08 di:ffffffffff600000 [9529508.435293] exe[40232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638e01a8686 cs:33 sp:7f9b9d3798e8 ax:ffffffffff600000 si:7f9b9d379e08 di:ffffffffff600000 [9529508.435695] exe[39564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638e01a8686 cs:33 sp:7f9b9d3588e8 ax:ffffffffff600000 si:7f9b9d358e08 di:ffffffffff600000 [9529646.754029] exe[54241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdbdd0d3e8 cs:33 sp:7fec2b82af90 ax:7fec2b82b020 si:ffffffffff600000 di:55cdbddc7019 [9529646.825668] exe[54241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdbdd0d3e8 cs:33 sp:7fec2b82af90 ax:7fec2b82b020 si:ffffffffff600000 di:55cdbddc7019 [9529646.825977] exe[53427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdbdd0d3e8 cs:33 sp:7fec2b3fef90 ax:7fec2b3ff020 si:ffffffffff600000 di:55cdbddc7019 [9529646.956865] exe[65402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdbdd0d3e8 cs:33 sp:7fec2b82af90 ax:7fec2b82b020 si:ffffffffff600000 di:55cdbddc7019 [9529646.976355] exe[66234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdbdd0d3e8 cs:33 sp:7fec2b3fef90 ax:7fec2b3ff020 si:ffffffffff600000 di:55cdbddc7019 [9531896.334715] exe[129235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563549966686 cs:33 sp:7f8cf85e28e8 ax:ffffffffff600000 si:7f8cf85e2e08 di:ffffffffff600000 [9531896.469100] exe[129108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563549966686 cs:33 sp:7f8cf85e28e8 ax:ffffffffff600000 si:7f8cf85e2e08 di:ffffffffff600000 [9531896.510247] exe[129693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563549966686 cs:33 sp:7f8cf85c18e8 ax:ffffffffff600000 si:7f8cf85c1e08 di:ffffffffff600000 [9531896.662383] exe[131471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563549966686 cs:33 sp:7f8cf85e28e8 ax:ffffffffff600000 si:7f8cf85e2e08 di:ffffffffff600000 [9531896.711455] exe[131486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563549966686 cs:33 sp:7f8cf85c18e8 ax:ffffffffff600000 si:7f8cf85c1e08 di:ffffffffff600000 [9532453.443108] exe[95832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff342cd686 cs:33 sp:7f9b5b977f88 ax:ffffffffff600000 si:20000d40 di:ffffffffff600000 [9532453.534010] exe[110600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff342cd686 cs:33 sp:7f9b5b956f88 ax:ffffffffff600000 si:20000d40 di:ffffffffff600000 [9532453.652983] exe[74215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff342cd686 cs:33 sp:7f9b5b956f88 ax:ffffffffff600000 si:20000d40 di:ffffffffff600000 [9532453.653130] exe[77394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff342cd686 cs:33 sp:7f9b5b935f88 ax:ffffffffff600000 si:20000d40 di:ffffffffff600000 [9532895.726494] exe[137540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558488d2e686 cs:33 sp:7f596a0ae8e8 ax:ffffffffff600000 si:7f596a0aee08 di:ffffffffff600000 [9532895.863239] exe[138579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558488d2e686 cs:33 sp:7f596a08d8e8 ax:ffffffffff600000 si:7f596a08de08 di:ffffffffff600000 [9532895.989352] exe[137662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558488d2e686 cs:33 sp:7f596a0ae8e8 ax:ffffffffff600000 si:7f596a0aee08 di:ffffffffff600000 [9533093.972538] exe[161093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a153e8 cs:33 sp:7f80367fef90 ax:7f80367ff020 si:ffffffffff600000 di:55eb24acf019 [9533094.051923] exe[161120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a153e8 cs:33 sp:7f80367fef90 ax:7f80367ff020 si:ffffffffff600000 di:55eb24acf019 [9533094.121298] exe[156319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a153e8 cs:33 sp:7f80367fef90 ax:7f80367ff020 si:ffffffffff600000 di:55eb24acf019 [9533094.147564] exe[161093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a153e8 cs:33 sp:7f80367bcf90 ax:7f80367bd020 si:ffffffffff600000 di:55eb24acf019 [9533380.514821] exe[151449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c34ce23e8 cs:33 sp:7fccffee0f90 ax:7fccffee1020 si:ffffffffff600000 di:556c34d9c019 [9533381.281112] exe[151449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c34ce23e8 cs:33 sp:7fccffee0f90 ax:7fccffee1020 si:ffffffffff600000 di:556c34d9c019 [9533381.348590] exe[155281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c34ce23e8 cs:33 sp:7fccffee0f90 ax:7fccffee1020 si:ffffffffff600000 di:556c34d9c019 [9533531.649122] exe[169450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2529f3e8 cs:33 sp:7f4a75484f90 ax:7f4a75485020 si:ffffffffff600000 di:558c25359019 [9533531.718118] exe[165668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2529f3e8 cs:33 sp:7f4a75484f90 ax:7f4a75485020 si:ffffffffff600000 di:558c25359019 [9533531.791457] exe[169450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2529f3e8 cs:33 sp:7f4a75484f90 ax:7f4a75485020 si:ffffffffff600000 di:558c25359019 [9533731.178131] exe[162161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545357f90 ax:7ed545358020 si:ffffffffff600000 di:55641442b019 [9533731.225162] exe[173983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.247096] exe[162179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.269050] exe[163046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.292152] exe[162160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.315098] exe[166403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.336375] exe[163046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.358235] exe[162165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.381052] exe[162160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9533731.402538] exe[162165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564143713e8 cs:33 sp:7ed545336f90 ax:7ed545337020 si:ffffffffff600000 di:55641442b019 [9534540.722517] warn_bad_vsyscall: 26 callbacks suppressed [9534540.722520] exe[201341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a75391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [9534540.812676] exe[198852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a75391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [9534540.826734] exe[211403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a75391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [9534540.913622] exe[209311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb24a75391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [9536077.241289] exe[216576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560883f90 ax:7ef560884020 si:ffffffffff600000 di:559846c1e019 [9536077.306875] exe[216576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.327219] exe[210910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.348286] exe[204697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.369634] exe[210910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.391255] exe[204697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.413192] exe[209556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.434537] exe[204697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.455842] exe[209545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9536077.476789] exe[216576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559846b643e8 cs:33 sp:7ef560841f90 ax:7ef560842020 si:ffffffffff600000 di:559846c1e019 [9539069.728675] warn_bad_vsyscall: 57 callbacks suppressed [9539069.728678] exe[348969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6828e8 ax:ffffffffff600000 si:7fc9bc682e08 di:ffffffffff600000 [9539069.849144] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539069.870228] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539069.891788] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539069.912978] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539069.935310] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539069.957156] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539069.979336] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539070.001197] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539070.023219] exe[354612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074350686 cs:33 sp:7fc9bc6618e8 ax:ffffffffff600000 si:7fc9bc661e08 di:ffffffffff600000 [9539709.304215] warn_bad_vsyscall: 41 callbacks suppressed [9539709.304219] exe[391498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b114e3e8 cs:33 sp:7ed9a4bddf90 ax:7ed9a4bde020 si:ffffffffff600000 di:5619b1208019 [9539709.367153] exe[391498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b114e3e8 cs:33 sp:7ed9a4bddf90 ax:7ed9a4bde020 si:ffffffffff600000 di:5619b1208019 [9539709.411625] exe[384011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b114e3e8 cs:33 sp:7ed9a4bbcf90 ax:7ed9a4bbd020 si:ffffffffff600000 di:5619b1208019 [9540331.400831] exe[435900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9540331.442762] exe[428231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9540332.276108] exe[428246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0388e8 ax:ffffffffff600000 si:7eb51c038e08 di:ffffffffff600000 [9540333.384640] exe[435836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9540333.453123] exe[435900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9540333.502968] exe[435900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9540333.569693] exe[428239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9540333.614719] exe[435836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9540333.673357] exe[423904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9540333.721667] exe[435900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613dd0f8686 cs:33 sp:7eebe6b768e8 ax:ffffffffff600000 si:7eebe6b76e08 di:ffffffffff600000 [9541237.437520] warn_bad_vsyscall: 9 callbacks suppressed [9541237.437523] exe[425423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642897c4686 cs:33 sp:7ed42ef9b8e8 ax:ffffffffff600000 si:7ed42ef9be08 di:ffffffffff600000 [9541238.239243] exe[429865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642897c4686 cs:33 sp:7ed42ef9b8e8 ax:ffffffffff600000 si:7ed42ef9be08 di:ffffffffff600000 [9541239.080333] exe[425440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642897c4686 cs:33 sp:7ed42ef7a8e8 ax:ffffffffff600000 si:7ed42ef7ae08 di:ffffffffff600000 [9541299.691461] exe[480657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e18a9f90 ax:7f56e18aa020 si:ffffffffff600000 di:5566dd1e7019 [9541299.764106] exe[485713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.789577] exe[485713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.819916] exe[485713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.843943] exe[485713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.866609] exe[485713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.891853] exe[478700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.913182] exe[478700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.934529] exe[478700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541299.957467] exe[478700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566dd12d3e8 cs:33 sp:7f56e1888f90 ax:7f56e1889020 si:ffffffffff600000 di:5566dd1e7019 [9541629.439918] warn_bad_vsyscall: 25 callbacks suppressed [9541629.439923] exe[480943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558dbc26e3e8 cs:33 sp:7f08ac1fef90 ax:7f08ac1ff020 si:ffffffffff600000 di:558dbc328019 [9541630.211294] exe[481567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558dbc26e3e8 cs:33 sp:7f08ac1bcf90 ax:7f08ac1bd020 si:ffffffffff600000 di:558dbc328019 [9541630.265463] exe[485534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558dbc26e3e8 cs:33 sp:7f08ac1fef90 ax:7f08ac1ff020 si:ffffffffff600000 di:558dbc328019 [9542330.120461] exe[423909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.170038] exe[423908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.193083] exe[478297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.214108] exe[423908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.235424] exe[478297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.256968] exe[427363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.279046] exe[478297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.302543] exe[423908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.326401] exe[427363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542330.348415] exe[478297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e598919686 cs:33 sp:7eb51c0598e8 ax:ffffffffff600000 si:7eb51c059e08 di:ffffffffff600000 [9542715.598274] warn_bad_vsyscall: 58 callbacks suppressed [9542715.598277] exe[485512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56033c9273e8 cs:33 sp:7f3fb6c8bf90 ax:7f3fb6c8c020 si:ffffffffff600000 di:56033c9e1019 [9542715.728134] exe[506787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56033c9273e8 cs:33 sp:7f3fb6c8bf90 ax:7f3fb6c8c020 si:ffffffffff600000 di:56033c9e1019 [9542715.868286] exe[507124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56033c9273e8 cs:33 sp:7f3fb6c8bf90 ax:7f3fb6c8c020 si:ffffffffff600000 di:56033c9e1019 [9544019.972006] exe[531288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3abd10391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4040000 [9544020.181913] exe[531288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3abd10391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4040000 [9544020.319543] exe[531166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3abd10391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4040000 [9544311.147255] exe[540700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c314e686 cs:33 sp:7f44d13a3f88 ax:ffffffffff600000 si:200055c0 di:ffffffffff600000 [9544311.301328] exe[540521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c314e686 cs:33 sp:7f44d1382f88 ax:ffffffffff600000 si:200055c0 di:ffffffffff600000 [9544312.047363] exe[540805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c314e686 cs:33 sp:7f44d1382f88 ax:ffffffffff600000 si:200055c0 di:ffffffffff600000 [9545175.289209] exe[577305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56530f6d03e8 cs:33 sp:7fe7511d6f90 ax:7fe7511d7020 si:ffffffffff600000 di:56530f78a019 [9545175.417904] exe[577279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56530f6d03e8 cs:33 sp:7fe7511d6f90 ax:7fe7511d7020 si:ffffffffff600000 di:56530f78a019 [9545175.553502] exe[577807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56530f6d03e8 cs:33 sp:7fe7511d6f90 ax:7fe7511d7020 si:ffffffffff600000 di:56530f78a019 [9545258.956845] exe[579826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defae78e8 ax:ffffffffff600000 si:7f6defae7e08 di:ffffffffff600000 [9545259.049617] exe[580139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defae78e8 ax:ffffffffff600000 si:7f6defae7e08 di:ffffffffff600000 [9545259.146262] exe[527259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defaa58e8 ax:ffffffffff600000 si:7f6defaa5e08 di:ffffffffff600000 [9545269.834521] exe[579595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545269.948602] exe[579590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.038286] exe[553959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.154279] exe[536597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.248649] exe[536597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.336948] exe[534519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.430886] exe[554010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.526928] exe[555637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.620482] exe[540102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545270.713614] exe[579600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545334.953833] warn_bad_vsyscall: 3 callbacks suppressed [9545334.953836] exe[579590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defae78e8 ax:ffffffffff600000 si:7f6defae7e08 di:ffffffffff600000 [9545335.055998] exe[579610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defae78e8 ax:ffffffffff600000 si:7f6defae7e08 di:ffffffffff600000 [9545335.056261] exe[579651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defac68e8 ax:ffffffffff600000 si:7f6defac6e08 di:ffffffffff600000 [9545335.202601] exe[527251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e0436686 cs:33 sp:7f6defae78e8 ax:ffffffffff600000 si:7f6defae7e08 di:ffffffffff600000 [9545365.814569] exe[560410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560c5f6f686 cs:33 sp:7fcea0e71f88 ax:ffffffffff600000 si:200062c0 di:ffffffffff600000 [9545365.866489] exe[560182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560c5f6f686 cs:33 sp:7fcea0e50f88 ax:ffffffffff600000 si:200062c0 di:ffffffffff600000 [9545366.640373] exe[579625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560c5f6f686 cs:33 sp:7fcea0e50f88 ax:ffffffffff600000 si:200062c0 di:ffffffffff600000 [9545461.776790] exe[580284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545461.905774] exe[555638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545461.996340] exe[527256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545462.078444] exe[528865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545462.145293] exe[553958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be58e94686 cs:33 sp:7f3b87f888e8 ax:ffffffffff600000 si:7f3b87f88e08 di:ffffffffff600000 [9545462.219073] exe[534534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545462.370101] exe[540102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545462.434651] exe[540102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545462.542961] exe[534518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545462.670915] exe[580253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545466.780316] warn_bad_vsyscall: 59 callbacks suppressed [9545466.780320] exe[528811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545466.816653] exe[528811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545466.851240] exe[528811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545466.888553] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545466.915640] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545466.943264] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545466.972032] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545467.002733] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545467.031034] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545467.060142] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545471.830028] warn_bad_vsyscall: 62 callbacks suppressed [9545471.830031] exe[579582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545471.921222] exe[553959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545472.595201] exe[533562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545472.714077] exe[553942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545473.477926] exe[579589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545473.609461] exe[555646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545474.349369] exe[545027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545474.432543] exe[545104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545474.532131] exe[527388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545474.620393] exe[580251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545476.887268] warn_bad_vsyscall: 13 callbacks suppressed [9545476.887270] exe[536598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545477.027865] exe[534518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545477.799521] exe[545037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545477.929934] exe[554010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545478.061770] exe[555646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545478.152370] exe[534541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545478.243063] exe[534541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545478.281223] exe[554040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545478.377822] exe[527182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545478.485932] exe[527182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545482.298855] warn_bad_vsyscall: 35 callbacks suppressed [9545482.298859] exe[527257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545482.397446] exe[540116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545483.168923] exe[580139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545483.255372] exe[579595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545484.050449] exe[527788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545484.146028] exe[555637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545484.234683] exe[580253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545484.325047] exe[555646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545484.420173] exe[580576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545484.526361] exe[553959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545487.409162] warn_bad_vsyscall: 88 callbacks suppressed [9545487.409165] exe[579577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545487.519729] exe[527164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545487.618523] exe[527257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545487.727588] exe[527263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545487.859766] exe[554010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545487.896255] exe[554010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545487.993446] exe[545027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545488.030577] exe[540112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545488.128984] exe[540116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545488.222868] exe[573896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545492.635262] warn_bad_vsyscall: 84 callbacks suppressed [9545492.635266] exe[579620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545492.749192] exe[527233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545492.848722] exe[573896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545492.881448] exe[527185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545492.911982] exe[534519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545492.940035] exe[534519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545492.971471] exe[527982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545493.000088] exe[527982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545493.032460] exe[527164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545493.061865] exe[527164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545497.809861] warn_bad_vsyscall: 55 callbacks suppressed [9545497.809864] exe[527224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe238e8 ax:ffffffffff600000 si:7f1d9fe23e08 di:ffffffffff600000 [9545497.907544] exe[536618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.001227] exe[553958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.131591] exe[540102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.176177] exe[573870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.284293] exe[540112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.421703] exe[536585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.513163] exe[579623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.617135] exe[553942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9545498.730443] exe[540112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560671785686 cs:33 sp:7f1d9fe448e8 ax:ffffffffff600000 si:7f1d9fe44e08 di:ffffffffff600000 [9546031.477251] warn_bad_vsyscall: 99 callbacks suppressed [9546031.477254] exe[590823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616d463b686 cs:33 sp:7f55510f78e8 ax:ffffffffff600000 si:7f55510f7e08 di:ffffffffff600000 [9546031.600696] exe[591470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616d463b686 cs:33 sp:7f55510f78e8 ax:ffffffffff600000 si:7f55510f7e08 di:ffffffffff600000 [9546031.639758] exe[591469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616d463b686 cs:33 sp:7f55510f78e8 ax:ffffffffff600000 si:7f55510f7e08 di:ffffffffff600000 [9546031.777772] exe[589565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616d463b686 cs:33 sp:7f55510d68e8 ax:ffffffffff600000 si:7f55510d6e08 di:ffffffffff600000 [9546038.112932] exe[596467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620e9bde686 cs:33 sp:7ee4f3da28e8 ax:ffffffffff600000 si:7ee4f3da2e08 di:ffffffffff600000 [9546038.176415] exe[584224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620e9bde686 cs:33 sp:7ee4f3d818e8 ax:ffffffffff600000 si:7ee4f3d81e08 di:ffffffffff600000 [9546038.227625] exe[584075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620e9bde686 cs:33 sp:7ee4f3da28e8 ax:ffffffffff600000 si:7ee4f3da2e08 di:ffffffffff600000 [9546216.896431] exe[536969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575ea854686 cs:33 sp:7fd0becca8e8 ax:ffffffffff600000 si:7fd0beccae08 di:ffffffffff600000 [9546216.992512] exe[567569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575ea854686 cs:33 sp:7fd0becca8e8 ax:ffffffffff600000 si:7fd0beccae08 di:ffffffffff600000 [9546217.089301] exe[579043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575ea854686 cs:33 sp:7fd0becca8e8 ax:ffffffffff600000 si:7fd0beccae08 di:ffffffffff600000 [9546952.501566] exe[574426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56077b8d1686 cs:33 sp:7f6afa8de8e8 ax:ffffffffff600000 si:7f6afa8dee08 di:ffffffffff600000 [9546952.550327] exe[574649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56077b8d1686 cs:33 sp:7f6afa8de8e8 ax:ffffffffff600000 si:7f6afa8dee08 di:ffffffffff600000 [9546952.578677] exe[574649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56077b8d1686 cs:33 sp:7f6afa8de8e8 ax:ffffffffff600000 si:7f6afa8dee08 di:ffffffffff600000 [9546952.622273] exe[574644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56077b8d1686 cs:33 sp:7f6afa8de8e8 ax:ffffffffff600000 si:7f6afa8dee08 di:ffffffffff600000 [9546952.622390] exe[575151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56077b8d1686 cs:33 sp:7f6afa8bd8e8 ax:ffffffffff600000 si:7f6afa8bde08 di:ffffffffff600000 [9548499.888815] exe[659885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561474953686 cs:33 sp:7fcdafe93f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9548500.129839] exe[660592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561474953686 cs:33 sp:7fcdafe93f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9548500.195693] exe[659885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561474953686 cs:33 sp:7fcdafe93f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9548500.405578] exe[664305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561474953686 cs:33 sp:7fcdafe72f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9548890.630781] exe[671202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556137727686 cs:33 sp:7f7125c63f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9548890.765787] exe[670930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556137727686 cs:33 sp:7f7125c63f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9548890.861980] exe[670619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556137727686 cs:33 sp:7f7125c42f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9548890.863203] exe[670641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556137727686 cs:33 sp:7f7125c63f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9549356.894577] exe[631725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605142ba686 cs:33 sp:7fdaf5288f88 ax:ffffffffff600000 si:20003d00 di:ffffffffff600000 [9549357.085916] exe[630743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605142ba686 cs:33 sp:7fdaf5246f88 ax:ffffffffff600000 si:20003d00 di:ffffffffff600000 [9549357.258773] exe[638560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605142ba686 cs:33 sp:7fdaf5288f88 ax:ffffffffff600000 si:20003d00 di:ffffffffff600000 [9549721.261405] exe[678502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b53f0686 cs:33 sp:7ec88f547f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9549721.536372] exe[681791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b53f0686 cs:33 sp:7ec88f547f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9549721.599085] exe[681791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b53f0686 cs:33 sp:7ec88f547f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9549721.838319] exe[681791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619b53f0686 cs:33 sp:7ec88f547f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9550414.813343] exe[679054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515f2233e8 cs:33 sp:7f0eba1d6f90 ax:7f0eba1d7020 si:ffffffffff600000 di:56515f2dd019 [9550415.573009] exe[632173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515f2233e8 cs:33 sp:7f0eba1d6f90 ax:7f0eba1d7020 si:ffffffffff600000 di:56515f2dd019 [9550415.708262] exe[637331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515f2233e8 cs:33 sp:7f0eba1d6f90 ax:7f0eba1d7020 si:ffffffffff600000 di:56515f2dd019 [9551007.343231] exe[696846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d595ad43e8 cs:33 sp:7efcf3bc3f90 ax:7efcf3bc4020 si:ffffffffff600000 di:55d595b8e019 [9551007.471091] exe[696845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d595ad43e8 cs:33 sp:7efcf3ba2f90 ax:7efcf3ba3020 si:ffffffffff600000 di:55d595b8e019 [9551008.065123] exe[697250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d595ad43e8 cs:33 sp:7efcf3bc3f90 ax:7efcf3bc4020 si:ffffffffff600000 di:55d595b8e019 [9551008.067258] exe[696852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d595ad43e8 cs:33 sp:7efcf3ba2f90 ax:7efcf3ba3020 si:ffffffffff600000 di:55d595b8e019 [9551156.716202] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bd68e8 ax:ffffffffff600000 si:7f8b98bd6e08 di:ffffffffff600000 [9551156.985036] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.023187] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.063134] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.101153] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.140869] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.181743] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.218642] exe[507926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.255147] exe[509384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551157.292254] exe[509384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed188d3686 cs:33 sp:7f8b98bb58e8 ax:ffffffffff600000 si:7f8b98bb5e08 di:ffffffffff600000 [9551651.543124] warn_bad_vsyscall: 61 callbacks suppressed [9551651.543127] exe[705494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574cc6b9686 cs:33 sp:7ff261c618e8 ax:ffffffffff600000 si:7ff261c61e08 di:ffffffffff600000 [9551651.640554] exe[731345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574cc6b9686 cs:33 sp:7ff261c618e8 ax:ffffffffff600000 si:7ff261c61e08 di:ffffffffff600000 [9551651.677815] exe[722734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574cc6b9686 cs:33 sp:7ff261c618e8 ax:ffffffffff600000 si:7ff261c61e08 di:ffffffffff600000 [9551652.311282] exe[728960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574cc6b9686 cs:33 sp:7ff261c618e8 ax:ffffffffff600000 si:7ff261c61e08 di:ffffffffff600000 [9551652.874754] exe[706695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560470c77686 cs:33 sp:7ee1caa438e8 ax:ffffffffff600000 si:7ee1caa43e08 di:ffffffffff600000 [9551652.922375] exe[730211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560470c77686 cs:33 sp:7ee1caa438e8 ax:ffffffffff600000 si:7ee1caa43e08 di:ffffffffff600000 [9551652.973048] exe[735023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560470c77686 cs:33 sp:7ee1caa438e8 ax:ffffffffff600000 si:7ee1caa43e08 di:ffffffffff600000 [9553558.301435] exe[706001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618d18aa686 cs:33 sp:7f65777cd8e8 ax:ffffffffff600000 si:7f65777cde08 di:ffffffffff600000 [9553558.426153] exe[764556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618d18aa686 cs:33 sp:7f65777cd8e8 ax:ffffffffff600000 si:7f65777cde08 di:ffffffffff600000 [9553558.562009] exe[755024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618d18aa686 cs:33 sp:7f65777cd8e8 ax:ffffffffff600000 si:7f65777cde08 di:ffffffffff600000 [9555282.902127] exe[827835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55771c56f686 cs:33 sp:7ffadcb2e8e8 ax:ffffffffff600000 si:7ffadcb2ee08 di:ffffffffff600000 [9555282.942036] exe[800362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55771c56f686 cs:33 sp:7ffadcb2e8e8 ax:ffffffffff600000 si:7ffadcb2ee08 di:ffffffffff600000 [9555282.989818] exe[791072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55771c56f686 cs:33 sp:7ffadcb2e8e8 ax:ffffffffff600000 si:7ffadcb2ee08 di:ffffffffff600000 [9556340.399458] exe[849848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14d7df686 cs:33 sp:7fb653f5f8e8 ax:ffffffffff600000 si:7fb653f5fe08 di:ffffffffff600000 [9556340.498082] exe[817644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14d7df686 cs:33 sp:7fb653f3e8e8 ax:ffffffffff600000 si:7fb653f3ee08 di:ffffffffff600000 [9556340.594040] exe[850662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14d7df686 cs:33 sp:7fb653f5f8e8 ax:ffffffffff600000 si:7fb653f5fe08 di:ffffffffff600000 [9556340.627689] exe[849912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14d7df686 cs:33 sp:7fb653f5f8e8 ax:ffffffffff600000 si:7fb653f5fe08 di:ffffffffff600000 [9556793.033906] exe[793036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e27372a686 cs:33 sp:7efe871f1f88 ax:ffffffffff600000 si:20003000 di:ffffffffff600000 [9556793.196571] exe[800031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e27372a686 cs:33 sp:7efe871f1f88 ax:ffffffffff600000 si:20003000 di:ffffffffff600000 [9556793.309120] exe[798081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e27372a686 cs:33 sp:7efe871d0f88 ax:ffffffffff600000 si:20003000 di:ffffffffff600000 [9557889.111370] exe[798435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56487680b391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:d001000 [9557889.316068] exe[803589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56487680b391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:d001000 [9557889.510541] exe[798434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56487680b391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:d001000 [9557889.562329] exe[799308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56487680b391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:d001000 [9558014.941572] exe[874858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52313d686 cs:33 sp:7f0b22dfe8e8 ax:ffffffffff600000 si:7f0b22dfee08 di:ffffffffff600000 [9558015.074850] exe[873436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52313d686 cs:33 sp:7f0b22d9b8e8 ax:ffffffffff600000 si:7f0b22d9be08 di:ffffffffff600000 [9558015.216730] exe[869770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52313d686 cs:33 sp:7f0b22dbc8e8 ax:ffffffffff600000 si:7f0b22dbce08 di:ffffffffff600000 [9558015.217564] exe[872657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52313d686 cs:33 sp:7f0b22ddd8e8 ax:ffffffffff600000 si:7f0b22ddde08 di:ffffffffff600000 [9558535.893572] exe[887599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db70a8b686 cs:33 sp:7f97b1b2f8e8 ax:ffffffffff600000 si:7f97b1b2fe08 di:ffffffffff600000 [9558536.021456] exe[895003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db70a8b686 cs:33 sp:7f97b1b2f8e8 ax:ffffffffff600000 si:7f97b1b2fe08 di:ffffffffff600000 [9558536.133041] exe[895075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db70a8b686 cs:33 sp:7f97b1b2f8e8 ax:ffffffffff600000 si:7f97b1b2fe08 di:ffffffffff600000 [9558769.590508] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558769.657493] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3db48e8 ax:ffffffffff600000 si:7efaa3db4e08 di:ffffffffff600000 [9558769.713457] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558770.081776] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558770.149335] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558770.214911] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558770.267301] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558770.315692] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558770.364446] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558770.413638] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558774.620618] warn_bad_vsyscall: 169 callbacks suppressed [9558774.620621] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558774.698710] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558774.755042] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558774.806803] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558774.856613] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558774.879537] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558774.901735] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558774.925199] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558774.946721] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558774.968791] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558780.115403] warn_bad_vsyscall: 203 callbacks suppressed [9558780.115406] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.166221] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.209075] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.258146] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.313706] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.356326] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.399364] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558780.449381] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558780.471199] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558780.492197] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9558851.111721] warn_bad_vsyscall: 391 callbacks suppressed [9558851.111725] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558851.169791] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558851.191026] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558851.245076] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558898.329844] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9558898.371777] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559175.039415] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559175.083702] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559175.120595] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559186.430152] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559186.487306] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559186.530201] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559194.462676] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559194.508898] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559194.549201] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559236.906449] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559236.952603] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559236.973758] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559236.997034] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559237.018116] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559237.039031] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559237.060983] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559237.082909] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559237.105039] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559237.126763] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559242.521865] warn_bad_vsyscall: 28 callbacks suppressed [9559242.521868] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559242.589627] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559242.589909] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559242.651094] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559248.624219] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559248.685161] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559248.706310] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559248.756932] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559256.074896] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559256.120261] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559256.162317] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559262.866445] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559262.960014] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559263.020112] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559274.352794] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559274.397329] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559274.466211] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559285.789687] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559285.842968] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559285.895166] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559292.861068] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559292.961540] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559292.982415] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.003173] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.024000] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.045439] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.066687] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.089096] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.111042] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559293.133664] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559305.908308] warn_bad_vsyscall: 124 callbacks suppressed [9559305.908311] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559305.986396] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559306.010230] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559306.059497] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559306.087173] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559307.239242] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559307.280643] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559307.302205] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559307.370841] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559308.949983] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559321.431145] warn_bad_vsyscall: 67 callbacks suppressed [9559321.431148] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559321.484340] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559321.526905] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559323.174281] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559323.241299] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559323.275944] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559323.329579] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559325.943505] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559325.997479] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559326.061474] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559326.806121] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559326.871030] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559326.941470] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559326.987381] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559327.041512] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559327.103158] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559327.125284] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559328.067882] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559328.113763] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559328.161094] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559341.473716] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559341.530044] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559341.570969] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559341.571813] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559354.505556] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559354.556908] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559354.601703] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559355.349869] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559355.405734] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559355.453723] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559373.319388] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559373.391728] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559373.450914] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559374.412235] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559374.469991] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559374.543356] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559376.553473] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559376.617170] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559376.637941] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559376.682541] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559388.940773] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559389.004068] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559389.025676] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559389.080150] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559397.455621] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559397.505444] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559397.505623] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559397.577613] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559397.599395] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559408.470130] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559408.514788] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559408.576717] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559420.683747] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559420.742605] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559420.766119] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559420.806502] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559424.161279] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559424.231809] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559424.287630] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559424.310525] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559451.203218] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559451.262577] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559451.263507] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559451.378277] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559451.411022] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559468.604250] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559468.684225] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559468.740419] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559468.741134] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559472.200479] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559472.253066] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559472.310628] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559472.331606] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559472.352363] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559472.374077] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559488.815259] warn_bad_vsyscall: 29 callbacks suppressed [9559488.815263] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559488.861643] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559488.884872] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559488.930587] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559489.753555] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559489.824204] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559489.879575] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559492.325973] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559492.376349] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559492.418366] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559519.080396] warn_bad_vsyscall: 1 callbacks suppressed [9559519.080399] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559519.127977] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559519.169325] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559523.351038] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559523.420173] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559523.420879] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559523.493016] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559525.719414] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559525.766565] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559525.791533] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559525.842410] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559525.852718] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559527.056992] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559527.141881] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559527.172343] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3db48e8 ax:ffffffffff600000 si:7efaa3db4e08 di:ffffffffff600000 [9559527.214435] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559528.107856] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559542.010204] warn_bad_vsyscall: 9 callbacks suppressed [9559542.010207] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559542.069932] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559542.135897] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559544.051073] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559544.100574] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559544.123293] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3db48e8 ax:ffffffffff600000 si:7efaa3db4e08 di:ffffffffff600000 [9559544.174277] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559544.196541] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3db48e8 ax:ffffffffff600000 si:7efaa3db4e08 di:ffffffffff600000 [9559563.070650] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559563.123942] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559563.177878] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559563.199244] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559582.732991] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559582.781133] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559582.830283] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559587.640291] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559587.693591] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559587.739236] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559602.239393] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559602.292497] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559602.342277] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559614.386251] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559614.427243] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559614.448833] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559614.494694] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559618.162711] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559618.211009] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559618.234355] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559618.277936] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559631.124241] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559631.169304] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559631.220304] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559631.239678] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559632.417299] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559632.464704] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559632.487602] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559632.548751] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559632.570622] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559633.056778] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559638.373389] warn_bad_vsyscall: 2 callbacks suppressed [9559638.373392] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559638.441808] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559638.463537] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559638.561133] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559639.618865] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559639.666691] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559639.710777] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559639.732510] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559640.351095] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559640.404559] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559653.958656] warn_bad_vsyscall: 2 callbacks suppressed [9559653.958659] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559654.011082] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559654.057045] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559655.671781] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559655.748854] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559655.753125] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559655.826280] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559655.826597] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559660.119984] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559660.212540] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559660.263622] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559673.490240] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559673.541725] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559673.607927] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559676.479005] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559676.550118] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559676.599413] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559679.551506] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559679.611752] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559679.661960] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559679.684966] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3db48e8 ax:ffffffffff600000 si:7efaa3db4e08 di:ffffffffff600000 [9559687.436929] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559687.484605] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559687.506890] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559687.544843] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559689.742440] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559689.784130] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559689.852981] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559691.141041] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559691.185766] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559691.230266] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559693.062157] warn_bad_vsyscall: 1 callbacks suppressed [9559693.062160] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559693.129149] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559693.174913] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559695.919225] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559695.981348] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559696.030422] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559712.258922] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559712.336512] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559712.392155] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559712.414231] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559717.239640] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559717.279887] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559717.323973] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559720.590864] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559720.640525] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3db48e8 ax:ffffffffff600000 si:7efaa3db4e08 di:ffffffffff600000 [9559720.689042] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559720.713559] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559724.300760] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559724.364380] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559724.418611] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559730.187155] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559730.258561] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559730.311524] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559744.091302] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559744.155131] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559744.207603] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559760.874493] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559760.924742] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559760.975435] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559773.611575] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559773.669134] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559773.718556] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559773.740221] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559781.808367] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559781.912921] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559781.934101] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559781.996117] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559787.894671] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559787.981710] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559788.026627] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.077232] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.129321] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.153090] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559792.215138] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.238944] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559792.626748] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.680902] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.936381] warn_bad_vsyscall: 2 callbacks suppressed [9559792.936385] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559792.936476] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559796.834832] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559796.891047] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559796.913686] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559796.950622] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559799.191216] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559799.241398] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559799.315414] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559819.592831] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559819.637855] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559819.660015] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559819.705267] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559828.543486] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559828.587746] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559828.636373] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559842.741800] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559842.793404] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559842.793732] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559842.861727] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559845.151689] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559845.199037] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559845.259825] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3dd58e8 ax:ffffffffff600000 si:7efaa3dd5e08 di:ffffffffff600000 [9559853.308643] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.414648] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.437760] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.509766] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.530340] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.550990] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.572268] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.595441] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.616085] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559853.637137] exe[881970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559860.669490] warn_bad_vsyscall: 26 callbacks suppressed [9559860.669493] exe[879453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559860.724061] exe[881214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559860.767570] exe[879447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559860.789907] exe[879445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0506686 cs:33 sp:7efaa3df68e8 ax:ffffffffff600000 si:7efaa3df6e08 di:ffffffffff600000 [9559913.774195] exe[927755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610600e53e8 cs:33 sp:7f8041a21f90 ax:7f8041a22020 si:ffffffffff600000 di:56106019f019 [9559913.846834] exe[932470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610600e53e8 cs:33 sp:7f8041a21f90 ax:7f8041a22020 si:ffffffffff600000 di:56106019f019 [9559913.922624] exe[917573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610600e53e8 cs:33 sp:7f80415fef90 ax:7f80415ff020 si:ffffffffff600000 di:56106019f019 [9560981.612270] exe[972367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c2905c3e8 cs:33 sp:7ef582fb3f90 ax:7ef582fb4020 si:ffffffffff600000 di:560c29116019 [9560981.670947] exe[971694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c2905c3e8 cs:33 sp:7ef582fb3f90 ax:7ef582fb4020 si:ffffffffff600000 di:560c29116019 [9560981.724561] exe[976851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c2905c3e8 cs:33 sp:7ef582fb3f90 ax:7ef582fb4020 si:ffffffffff600000 di:560c29116019 [9561663.458740] exe[958600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c609da2686 cs:33 sp:7f4a647698e8 ax:ffffffffff600000 si:7f4a64769e08 di:ffffffffff600000 [9561663.564809] exe[959065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c609da2686 cs:33 sp:7f4a647488e8 ax:ffffffffff600000 si:7f4a64748e08 di:ffffffffff600000 [9561663.687363] exe[958681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c609da2686 cs:33 sp:7f4a647698e8 ax:ffffffffff600000 si:7f4a64769e08 di:ffffffffff600000 [9561680.222482] exe[978233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caf2f8a686 cs:33 sp:7f9bb1be28e8 ax:ffffffffff600000 si:7f9bb1be2e08 di:ffffffffff600000 [9561680.298142] exe[961978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caf2f8a686 cs:33 sp:7f9bb1be28e8 ax:ffffffffff600000 si:7f9bb1be2e08 di:ffffffffff600000 [9561680.364876] exe[962023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caf2f8a686 cs:33 sp:7f9bb1be28e8 ax:ffffffffff600000 si:7f9bb1be2e08 di:ffffffffff600000 [9563190.615941] exe[53118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2392893e8 cs:33 sp:7f7f30315f90 ax:7f7f30316020 si:ffffffffff600000 di:55b239343019 [9563190.704590] exe[56788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2392893e8 cs:33 sp:7f7f30315f90 ax:7f7f30316020 si:ffffffffff600000 di:55b239343019 [9563190.800200] exe[48712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2392893e8 cs:33 sp:7f7f30315f90 ax:7f7f30316020 si:ffffffffff600000 di:55b239343019 [9563382.794235] exe[981960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e18ee686 cs:33 sp:7fe57ed65f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9563382.887166] exe[983023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e18ee686 cs:33 sp:7fe57ed65f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9563382.981691] exe[53069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e18ee686 cs:33 sp:7fe57ed65f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [9564387.751202] exe[18364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfae792686 cs:33 sp:7f18403998e8 ax:ffffffffff600000 si:7f1840399e08 di:ffffffffff600000 [9564388.641286] exe[17463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfae792686 cs:33 sp:7f18403998e8 ax:ffffffffff600000 si:7f1840399e08 di:ffffffffff600000 [9564389.519366] exe[18378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfae792686 cs:33 sp:7f18403998e8 ax:ffffffffff600000 si:7f1840399e08 di:ffffffffff600000 [9565661.797100] exe[81623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283ec8e8 ax:ffffffffff600000 si:7faa283ece08 di:ffffffffff600000 [9565661.949315] exe[116806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283ec8e8 ax:ffffffffff600000 si:7faa283ece08 di:ffffffffff600000 [9565662.055473] exe[78237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.084724] exe[78237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.117209] exe[78237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.148375] exe[76721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.176761] exe[76721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.208379] exe[76721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.245751] exe[76721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9565662.275108] exe[76721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef19d6e686 cs:33 sp:7faa283cb8e8 ax:ffffffffff600000 si:7faa283cbe08 di:ffffffffff600000 [9567288.354603] warn_bad_vsyscall: 57 callbacks suppressed [9567288.354607] exe[177713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0485318e8 ax:ffffffffff600000 si:7fa048531e08 di:ffffffffff600000 [9567289.097516] exe[158290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0485318e8 ax:ffffffffff600000 si:7fa048531e08 di:ffffffffff600000 [9567289.151085] exe[172665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0485318e8 ax:ffffffffff600000 si:7fa048531e08 di:ffffffffff600000 [9567861.610102] exe[198632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9567861.658074] exe[187535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9567861.727238] exe[196880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9567861.751867] exe[196730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9568212.913508] exe[130781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55836add0686 cs:33 sp:7fbdc3c26f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [9568213.040347] exe[140930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55836add0686 cs:33 sp:7fbdc3c26f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [9568213.040688] exe[193175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55836add0686 cs:33 sp:7fbdc37fef88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [9568213.151661] exe[172529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55836add0686 cs:33 sp:7fbdc37fef88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [9568370.119450] exe[161015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7754b4686 cs:33 sp:7fae214e38e8 ax:ffffffffff600000 si:7fae214e3e08 di:ffffffffff600000 [9568370.290611] exe[161084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7754b4686 cs:33 sp:7fae214e38e8 ax:ffffffffff600000 si:7fae214e3e08 di:ffffffffff600000 [9568370.430358] exe[126093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7754b4686 cs:33 sp:7fae214e38e8 ax:ffffffffff600000 si:7fae214e3e08 di:ffffffffff600000 [9568735.545741] exe[190230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9568735.623574] exe[187731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9568735.721253] exe[196885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb3ae686 cs:33 sp:7f544fe598e8 ax:ffffffffff600000 si:7f544fe59e08 di:ffffffffff600000 [9569452.239399] exe[229134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0485318e8 ax:ffffffffff600000 si:7fa048531e08 di:ffffffffff600000 [9569452.328502] exe[227896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0485318e8 ax:ffffffffff600000 si:7fa048531e08 di:ffffffffff600000 [9569452.332803] exe[234833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0485108e8 ax:ffffffffff600000 si:7fa048510e08 di:ffffffffff600000 [9569452.412175] exe[147000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616630b5686 cs:33 sp:7fa0484ef8e8 ax:ffffffffff600000 si:7fa0484efe08 di:ffffffffff600000 [9569577.081938] exe[224764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634f61b2686 cs:33 sp:7fb1fc3118e8 ax:ffffffffff600000 si:7fb1fc311e08 di:ffffffffff600000 [9569577.639664] exe[241247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd3ff78686 cs:33 sp:7f63a29da8e8 ax:ffffffffff600000 si:7f63a29dae08 di:ffffffffff600000 [9569580.238279] exe[240463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e2f7b1686 cs:33 sp:7f11a14648e8 ax:ffffffffff600000 si:7f11a1464e08 di:ffffffffff600000 [9569610.292894] exe[79753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f714e4c686 cs:33 sp:7f2c86bcc8e8 ax:ffffffffff600000 si:7f2c86bcce08 di:ffffffffff600000 [9569626.135384] exe[196741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fcd600686 cs:33 sp:7efd9425f8e8 ax:ffffffffff600000 si:7efd9425fe08 di:ffffffffff600000 [9569629.013327] exe[214834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562798b10686 cs:33 sp:7f579abfe8e8 ax:ffffffffff600000 si:7f579abfee08 di:ffffffffff600000 [9569743.073909] exe[192589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55879e43c3e8 cs:33 sp:7ec36bde4f90 ax:7ec36bde5020 si:ffffffffff600000 di:55879e4f6019 [9569743.137604] exe[243650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55879e43c3e8 cs:33 sp:7ec36bd81f90 ax:7ec36bd82020 si:ffffffffff600000 di:55879e4f6019 [9569743.221765] exe[243649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55879e43c3e8 cs:33 sp:7ec36bde4f90 ax:7ec36bde5020 si:ffffffffff600000 di:55879e4f6019 [9569792.800867] exe[214568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f77b9fb686 cs:33 sp:7f90f0e8a8e8 ax:ffffffffff600000 si:7f90f0e8ae08 di:ffffffffff600000 [9569792.856864] exe[214568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f77b9fb686 cs:33 sp:7f90f0e8a8e8 ax:ffffffffff600000 si:7f90f0e8ae08 di:ffffffffff600000 [9569792.919946] exe[243825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f77b9fb686 cs:33 sp:7f90f0e8a8e8 ax:ffffffffff600000 si:7f90f0e8ae08 di:ffffffffff600000 [9569797.440638] exe[135470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56015e176686 cs:33 sp:7fdad70fb8e8 ax:ffffffffff600000 si:7fdad70fbe08 di:ffffffffff600000 [9569797.846683] exe[159432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56015e176686 cs:33 sp:7fdad70fb8e8 ax:ffffffffff600000 si:7fdad70fbe08 di:ffffffffff600000 [9569798.244030] exe[175046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56015e176686 cs:33 sp:7fdad70b98e8 ax:ffffffffff600000 si:7fdad70b9e08 di:ffffffffff600000 [9569908.098080] exe[993686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609b15d7686 cs:33 sp:7ecd2f3c88e8 ax:ffffffffff600000 si:7ecd2f3c8e08 di:ffffffffff600000 [9569912.668301] exe[185060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464d9a9686 cs:33 sp:7ee92ed0a8e8 ax:ffffffffff600000 si:7ee92ed0ae08 di:ffffffffff600000 [9569913.498620] exe[175920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564da240b686 cs:33 sp:7f78e1ffe8e8 ax:ffffffffff600000 si:7f78e1ffee08 di:ffffffffff600000 [9569928.143488] exe[237777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7da295686 cs:33 sp:7ef80166b8e8 ax:ffffffffff600000 si:7ef80166be08 di:ffffffffff600000 [9569931.263524] exe[246743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec482ff686 cs:33 sp:7eed1476c8e8 ax:ffffffffff600000 si:7eed1476ce08 di:ffffffffff600000 [9569931.861311] exe[226987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df805b2686 cs:33 sp:7f223cb478e8 ax:ffffffffff600000 si:7f223cb47e08 di:ffffffffff600000 [9569949.325835] exe[216784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb35f3e8 cs:33 sp:7f544fe59f90 ax:7f544fe5a020 si:ffffffffff600000 di:5653eb419019 [9569949.412639] exe[216798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb35f3e8 cs:33 sp:7f544fe59f90 ax:7f544fe5a020 si:ffffffffff600000 di:5653eb419019 [9569949.491630] exe[244989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653eb35f3e8 cs:33 sp:7f544fe38f90 ax:7f544fe39020 si:ffffffffff600000 di:5653eb419019 [9570026.263606] exe[251110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac11270686 cs:33 sp:7f899c8de8e8 ax:ffffffffff600000 si:7f899c8dee08 di:ffffffffff600000 [9570047.624951] exe[251790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557abe19d686 cs:33 sp:7f16f42918e8 ax:ffffffffff600000 si:7f16f4291e08 di:ffffffffff600000 [9570327.186760] exe[187624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aef0a3e8 cs:33 sp:7ee27b1fef90 ax:7ee27b1ff020 si:ffffffffff600000 di:55e6aefc4019 [9570327.253239] exe[187624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aef0a3e8 cs:33 sp:7ee27b1fef90 ax:7ee27b1ff020 si:ffffffffff600000 di:55e6aefc4019 [9570327.295571] exe[183349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6aef0a3e8 cs:33 sp:7ee27b1ddf90 ax:7ee27b1de020 si:ffffffffff600000 di:55e6aefc4019 [9570373.538192] exe[228259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56063a0e8686 cs:33 sp:7fcd930998e8 ax:ffffffffff600000 si:7fcd93099e08 di:ffffffffff600000 [9570373.606839] exe[228481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56063a0e8686 cs:33 sp:7fcd930998e8 ax:ffffffffff600000 si:7fcd93099e08 di:ffffffffff600000 [9570373.626794] exe[239624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56063a0e8686 cs:33 sp:7fcd930788e8 ax:ffffffffff600000 si:7fcd93078e08 di:ffffffffff600000 [9570373.731114] exe[228261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56063a0e8686 cs:33 sp:7fcd930788e8 ax:ffffffffff600000 si:7fcd93078e08 di:ffffffffff600000 [9570679.080477] exe[259762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebc84b2686 cs:33 sp:7fe13eb248e8 ax:ffffffffff600000 si:7fe13eb24e08 di:ffffffffff600000 [9570866.406289] exe[239199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7cc2b686 cs:33 sp:7ec873821f88 ax:ffffffffff600000 si:20001640 di:ffffffffff600000 [9570866.455375] exe[239199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7cc2b686 cs:33 sp:7ec873821f88 ax:ffffffffff600000 si:20001640 di:ffffffffff600000 [9570866.516326] exe[269975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7cc2b686 cs:33 sp:7ec8733fef88 ax:ffffffffff600000 si:20001640 di:ffffffffff600000 [9570948.433024] exe[234209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464d9a9686 cs:33 sp:7ee92ed0a8e8 ax:ffffffffff600000 si:7ee92ed0ae08 di:ffffffffff600000 [9570948.471865] exe[254519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464d9a9686 cs:33 sp:7ee92ed0a8e8 ax:ffffffffff600000 si:7ee92ed0ae08 di:ffffffffff600000 [9570948.471897] exe[234209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464d9a9686 cs:33 sp:7ee92ece98e8 ax:ffffffffff600000 si:7ee92ece9e08 di:ffffffffff600000 [9570948.553828] exe[254519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464d9a9686 cs:33 sp:7ee92ece98e8 ax:ffffffffff600000 si:7ee92ece9e08 di:ffffffffff600000 [9571298.069036] exe[279120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563582900686 cs:33 sp:7f240bdfe8e8 ax:ffffffffff600000 si:7f240bdfee08 di:ffffffffff600000 [9571686.964640] exe[265192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562751395686 cs:33 sp:7f129e29ef88 ax:ffffffffff600000 si:20000a80 di:ffffffffff600000 [9571687.547913] exe[292027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562751395686 cs:33 sp:7f129e29ef88 ax:ffffffffff600000 si:20000a80 di:ffffffffff600000 [9571687.773553] exe[271370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562751395686 cs:33 sp:7f129e29ef88 ax:ffffffffff600000 si:20000a80 di:ffffffffff600000 [9572330.754157] exe[301884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa1ea9f686 cs:33 sp:7fbfdf18e8e8 ax:ffffffffff600000 si:7fbfdf18ee08 di:ffffffffff600000 [9572330.867766] exe[302687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa1ea9f686 cs:33 sp:7fbfdf18e8e8 ax:ffffffffff600000 si:7fbfdf18ee08 di:ffffffffff600000 [9572330.909849] exe[302675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa1ea9f686 cs:33 sp:7fbfdf14c8e8 ax:ffffffffff600000 si:7fbfdf14ce08 di:ffffffffff600000 [9572331.003299] exe[301784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa1ea9f686 cs:33 sp:7fbfdf18e8e8 ax:ffffffffff600000 si:7fbfdf18ee08 di:ffffffffff600000 [9572331.046260] exe[306703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa1ea9f686 cs:33 sp:7fbfdf18e8e8 ax:ffffffffff600000 si:7fbfdf18ee08 di:ffffffffff600000 [9572523.655270] exe[269896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed745d33e8 cs:33 sp:7f15b38b9f90 ax:7f15b38ba020 si:ffffffffff600000 di:55ed7468d019 [9572523.727125] exe[269896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed745d33e8 cs:33 sp:7f15b38b9f90 ax:7f15b38ba020 si:ffffffffff600000 di:55ed7468d019 [9572523.801840] exe[269637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed745d33e8 cs:33 sp:7f15b38b9f90 ax:7f15b38ba020 si:ffffffffff600000 di:55ed7468d019 [9574027.338217] exe[365025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565380431686 cs:33 sp:7f7851e258e8 ax:ffffffffff600000 si:7f7851e25e08 di:ffffffffff600000 [9574027.415594] exe[400475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565380431686 cs:33 sp:7f7851e258e8 ax:ffffffffff600000 si:7f7851e25e08 di:ffffffffff600000 [9574027.502069] exe[399551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565380431686 cs:33 sp:7f7851e258e8 ax:ffffffffff600000 si:7f7851e25e08 di:ffffffffff600000 [9574027.577733] exe[399814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565380431686 cs:33 sp:7f7851e258e8 ax:ffffffffff600000 si:7f7851e25e08 di:ffffffffff600000 [9574572.285055] exe[357466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602b3932686 cs:33 sp:7f9a334748e8 ax:ffffffffff600000 si:7f9a33474e08 di:ffffffffff600000 [9574572.403884] exe[414737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602b3932686 cs:33 sp:7f9a334748e8 ax:ffffffffff600000 si:7f9a33474e08 di:ffffffffff600000 [9574572.562410] exe[357465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602b3932686 cs:33 sp:7f9a334748e8 ax:ffffffffff600000 si:7f9a33474e08 di:ffffffffff600000 [9574572.713405] exe[381900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602b3932686 cs:33 sp:7f9a334748e8 ax:ffffffffff600000 si:7f9a33474e08 di:ffffffffff600000 [9574805.382602] exe[397274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1b8aea686 cs:33 sp:7f95df3758e8 ax:ffffffffff600000 si:7f95df375e08 di:ffffffffff600000 [9574805.502093] exe[371483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1b8aea686 cs:33 sp:7f95df3758e8 ax:ffffffffff600000 si:7f95df375e08 di:ffffffffff600000 [9574805.517543] exe[398813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56434ef26686 cs:33 sp:7f6a861fe8e8 ax:ffffffffff600000 si:7f6a861fee08 di:ffffffffff600000 [9574805.538110] exe[423634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fd6371686 cs:33 sp:7fe0a71fe8e8 ax:ffffffffff600000 si:7fe0a71fee08 di:ffffffffff600000 [9574805.560316] exe[398766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639bf208686 cs:33 sp:7f9ec9b708e8 ax:ffffffffff600000 si:7f9ec9b70e08 di:ffffffffff600000 [9574805.636866] exe[403526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fd6371686 cs:33 sp:7fe0a71fe8e8 ax:ffffffffff600000 si:7fe0a71fee08 di:ffffffffff600000 [9574805.648508] exe[415911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56434ef26686 cs:33 sp:7f6a861fe8e8 ax:ffffffffff600000 si:7f6a861fee08 di:ffffffffff600000 [9574805.657660] exe[398782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1b8aea686 cs:33 sp:7f95df3758e8 ax:ffffffffff600000 si:7f95df375e08 di:ffffffffff600000 [9574805.708054] exe[397274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639bf208686 cs:33 sp:7f9ec9b708e8 ax:ffffffffff600000 si:7f9ec9b70e08 di:ffffffffff600000 [9574805.779452] exe[415911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fd6371686 cs:33 sp:7fe0a71fe8e8 ax:ffffffffff600000 si:7fe0a71fee08 di:ffffffffff600000 [9574906.239159] warn_bad_vsyscall: 3 callbacks suppressed [9574906.239162] exe[403164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda6461686 cs:33 sp:7f0028cc38e8 ax:ffffffffff600000 si:7f0028cc3e08 di:ffffffffff600000 [9574906.466962] exe[405526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda6461686 cs:33 sp:7f0028cc38e8 ax:ffffffffff600000 si:7f0028cc3e08 di:ffffffffff600000 [9574906.563955] exe[414572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda6461686 cs:33 sp:7f0028cc38e8 ax:ffffffffff600000 si:7f0028cc3e08 di:ffffffffff600000 [9574906.671991] exe[405609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda6461686 cs:33 sp:7f0028cc38e8 ax:ffffffffff600000 si:7f0028cc3e08 di:ffffffffff600000 [9575520.378205] exe[398525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3d6dca686 cs:33 sp:7f0c9a9f28e8 ax:ffffffffff600000 si:7f0c9a9f2e08 di:ffffffffff600000 [9575520.446904] exe[398440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3d6dca686 cs:33 sp:7f0c9a9f28e8 ax:ffffffffff600000 si:7f0c9a9f2e08 di:ffffffffff600000 [9575520.498126] exe[399734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3d6dca686 cs:33 sp:7f0c9a9f28e8 ax:ffffffffff600000 si:7f0c9a9f2e08 di:ffffffffff600000 [9575520.650207] exe[425843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3d6dca686 cs:33 sp:7f0c9a9f28e8 ax:ffffffffff600000 si:7f0c9a9f2e08 di:ffffffffff600000 [9575873.403345] exe[441817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56323b046dc9 cs:33 sp:7f9d05a20598 ax:8 si:1 di:7f9d05a20660 [9575873.528130] exe[441804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56323b046dc9 cs:33 sp:7f9d05a20598 ax:8 si:1 di:7f9d05a20660 [9575873.686358] exe[424438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56323b046dc9 cs:33 sp:7f9d05a20598 ax:8 si:1 di:7f9d05a20660 [9576042.698157] exe[347179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3d6dca686 cs:33 sp:7f0c9a9f28e8 ax:ffffffffff600000 si:7f0c9a9f2e08 di:ffffffffff600000 [9577820.617211] exe[476311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd9be54686 cs:33 sp:7f3225f588e8 ax:ffffffffff600000 si:7f3225f58e08 di:ffffffffff600000 [9578595.843864] exe[501262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cc2171686 cs:33 sp:7f70f88968e8 ax:ffffffffff600000 si:7f70f8896e08 di:ffffffffff600000 [9578748.203839] exe[523825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cc2171686 cs:33 sp:7f70f88968e8 ax:ffffffffff600000 si:7f70f8896e08 di:ffffffffff600000 [9578916.337948] exe[490738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557aebec4686 cs:33 sp:7f38d67fe8e8 ax:ffffffffff600000 si:7f38d67fee08 di:ffffffffff600000 [9579374.506783] exe[529354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebb6b633e8 cs:33 sp:7fac22f0af90 ax:7fac22f0b020 si:ffffffffff600000 di:55ebb6c1d019 [9579374.664495] exe[505319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebb6b633e8 cs:33 sp:7fac22f0af90 ax:7fac22f0b020 si:ffffffffff600000 di:55ebb6c1d019 [9579375.142600] exe[505319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebb6b633e8 cs:33 sp:7fac22f0af90 ax:7fac22f0b020 si:ffffffffff600000 di:55ebb6c1d019 [9580669.760155] exe[552870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565424931686 cs:33 sp:7ff68c9ef8e8 ax:ffffffffff600000 si:7ff68c9efe08 di:ffffffffff600000 [9580670.419123] exe[586800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cef0c16686 cs:33 sp:7ff3073f48e8 ax:ffffffffff600000 si:7ff3073f4e08 di:ffffffffff600000 [9580670.929436] exe[592539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649e00d1686 cs:33 sp:7eb258ea88e8 ax:ffffffffff600000 si:7eb258ea8e08 di:ffffffffff600000 [9580671.676502] exe[593007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565097256686 cs:33 sp:7f8a877298e8 ax:ffffffffff600000 si:7f8a87729e08 di:ffffffffff600000 [9580671.878126] exe[583457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55690ac2d686 cs:33 sp:7ef61d1608e8 ax:ffffffffff600000 si:7ef61d160e08 di:ffffffffff600000 [9580671.926638] exe[592943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56110d6bc686 cs:33 sp:7f6cd24958e8 ax:ffffffffff600000 si:7f6cd2495e08 di:ffffffffff600000 [9580674.431288] exe[564647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618dff70686 cs:33 sp:7fdc556a98e8 ax:ffffffffff600000 si:7fdc556a9e08 di:ffffffffff600000 [9580681.640479] exe[543267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56257a577686 cs:33 sp:7f8ae4df58e8 ax:ffffffffff600000 si:7f8ae4df5e08 di:ffffffffff600000 [9580683.026607] exe[555894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648867bf686 cs:33 sp:7fc31bdc58e8 ax:ffffffffff600000 si:7fc31bdc5e08 di:ffffffffff600000 [9580688.373423] exe[365667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdae75f686 cs:33 sp:7eecd83088e8 ax:ffffffffff600000 si:7eecd8308e08 di:ffffffffff600000 [9580689.218771] exe[552291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c80a29686 cs:33 sp:7efe6b9b48e8 ax:ffffffffff600000 si:7efe6b9b4e08 di:ffffffffff600000 [9580705.226742] exe[569647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55589fc74686 cs:33 sp:7f87856918e8 ax:ffffffffff600000 si:7f8785691e08 di:ffffffffff600000 [9580761.087913] exe[568075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcb6db7686 cs:33 sp:7f6e330238e8 ax:ffffffffff600000 si:7f6e33023e08 di:ffffffffff600000 [9580822.153790] exe[576578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddb44ff686 cs:33 sp:7f16599158e8 ax:ffffffffff600000 si:7f1659915e08 di:ffffffffff600000 [9580837.642562] exe[589404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9d8eff686 cs:33 sp:7f2ea20b18e8 ax:ffffffffff600000 si:7f2ea20b1e08 di:ffffffffff600000 [9581031.261460] exe[580054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e557c7686 cs:33 sp:7ecf6b824f88 ax:ffffffffff600000 si:20001040 di:ffffffffff600000 [9581031.317518] exe[601312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e557c7686 cs:33 sp:7ecf6b3fef88 ax:ffffffffff600000 si:20001040 di:ffffffffff600000 [9581031.391767] exe[593448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e557c7686 cs:33 sp:7ecf6b3fef88 ax:ffffffffff600000 si:20001040 di:ffffffffff600000 [9581214.679357] exe[588492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c7fe88686 cs:33 sp:7eb54ee978e8 ax:ffffffffff600000 si:7eb54ee97e08 di:ffffffffff600000 [9582962.246285] exe[569572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.314440] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.336400] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.359652] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.382385] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.407388] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.431267] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.455368] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.478576] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9582962.500348] exe[570371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab61481686 cs:33 sp:7f4af41a48e8 ax:ffffffffff600000 si:7f4af41a4e08 di:ffffffffff600000 [9583267.753144] warn_bad_vsyscall: 25 callbacks suppressed [9583267.753148] exe[584407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55690ac2d686 cs:33 sp:7ef61d160f88 ax:ffffffffff600000 si:20004a80 di:ffffffffff600000 [9583267.839473] exe[591560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55690ac2d686 cs:33 sp:7ef61d13ff88 ax:ffffffffff600000 si:20004a80 di:ffffffffff600000 [9583267.904155] exe[591559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55690ac2d686 cs:33 sp:7ef61d160f88 ax:ffffffffff600000 si:20004a80 di:ffffffffff600000 [9583856.964331] exe[675967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4e6f90 ax:7f525c4e7020 si:ffffffffff600000 di:55e90bcd9019 [9583857.012771] exe[671227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.033727] exe[671227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.054606] exe[671227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.076836] exe[671227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.098316] exe[678405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.120289] exe[678405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.144439] exe[674972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.168554] exe[674972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9583857.190187] exe[674972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90bc1f3e8 cs:33 sp:7f525c4a4f90 ax:7f525c4a5020 si:ffffffffff600000 di:55e90bcd9019 [9585939.319842] warn_bad_vsyscall: 25 callbacks suppressed [9585939.319845] exe[703001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f57d9953e8 cs:33 sp:7f4257f74f90 ax:7f4257f75020 si:ffffffffff600000 di:55f57da4f019 [9585939.437506] exe[726834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f57d9953e8 cs:33 sp:7f4257f74f90 ax:7f4257f75020 si:ffffffffff600000 di:55f57da4f019 [9585939.549445] exe[726834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f57d9953e8 cs:33 sp:7f4257f74f90 ax:7f4257f75020 si:ffffffffff600000 di:55f57da4f019 [9585939.593043] exe[726834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f57d9953e8 cs:33 sp:7f4257f32f90 ax:7f4257f33020 si:ffffffffff600000 di:55f57da4f019 [9586075.640402] exe[662330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2b7b7e3e8 cs:33 sp:7f693a9fef90 ax:7f693a9ff020 si:ffffffffff600000 di:55c2b7c38019 [9586075.691257] exe[714732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2b7b7e3e8 cs:33 sp:7f693a9fef90 ax:7f693a9ff020 si:ffffffffff600000 di:55c2b7c38019 [9586075.736906] exe[697388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2b7b7e3e8 cs:33 sp:7f693a9fef90 ax:7f693a9ff020 si:ffffffffff600000 di:55c2b7c38019 [9586089.716404] exe[683415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a54e28686 cs:33 sp:7eb3fae9a8e8 ax:ffffffffff600000 si:7eb3fae9ae08 di:ffffffffff600000 [9586090.460864] exe[688898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a54e28686 cs:33 sp:7eb3fae9a8e8 ax:ffffffffff600000 si:7eb3fae9ae08 di:ffffffffff600000 [9586090.590968] exe[683419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a54e28686 cs:33 sp:7eb3fae9a8e8 ax:ffffffffff600000 si:7eb3fae9ae08 di:ffffffffff600000 [9587991.256755] exe[781668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56337723f686 cs:33 sp:7f48b12b88e8 ax:ffffffffff600000 si:7f48b12b8e08 di:ffffffffff600000 [9587991.348568] exe[799943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56337723f686 cs:33 sp:7f48b12b88e8 ax:ffffffffff600000 si:7f48b12b8e08 di:ffffffffff600000 [9587991.369457] exe[810090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56337723f686 cs:33 sp:7f48b12978e8 ax:ffffffffff600000 si:7f48b1297e08 di:ffffffffff600000 [9587994.282721] exe[809810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56337723f686 cs:33 sp:7f48b12b88e8 ax:ffffffffff600000 si:7f48b12b8e08 di:ffffffffff600000 [9588385.487841] exe[771737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558677f5c020 cs:33 sp:7f02809de110 ax:558677f5c020 si:3 di:55867801cab0 [9588516.799515] exe[793751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0b5026686 cs:33 sp:7f14504498e8 ax:ffffffffff600000 si:7f1450449e08 di:ffffffffff600000 [9588516.905065] exe[792871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0b5026686 cs:33 sp:7f14504498e8 ax:ffffffffff600000 si:7f1450449e08 di:ffffffffff600000 [9588517.009383] exe[792312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0b5026686 cs:33 sp:7f14504498e8 ax:ffffffffff600000 si:7f1450449e08 di:ffffffffff600000 [9588996.006440] exe[820563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588996.754174] exe[804824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588996.890239] exe[807429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588996.922412] exe[807429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588996.952616] exe[807429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588996.982465] exe[807429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588997.012584] exe[804882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588997.044651] exe[804882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588997.084139] exe[804882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9588997.111762] exe[804882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c0670b686 cs:33 sp:7f36515d68e8 ax:ffffffffff600000 si:7f36515d6e08 di:ffffffffff600000 [9589275.630329] warn_bad_vsyscall: 56 callbacks suppressed [9589275.630332] exe[812406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562134bd5686 cs:33 sp:7fc6c8ffaf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [9589275.764296] exe[806957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562134bd5686 cs:33 sp:7fc6c8fb8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [9589275.894229] exe[847264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562134bd5686 cs:33 sp:7fc6c8ffaf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [9589313.515334] exe[815117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562134bd5686 cs:33 sp:7fc6c8ffaf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [9589313.844384] exe[808390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562134bd5686 cs:33 sp:7fc6c8ffaf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [9589314.064792] exe[806629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562134bd5686 cs:33 sp:7fc6c8ffaf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [9591057.332589] exe[890549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdcce87686 cs:33 sp:7efbf4d7ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [9591057.372483] exe[890549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdcce87686 cs:33 sp:7efbf4d5ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [9591057.412830] exe[890538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdcce87686 cs:33 sp:7efbf4d7ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [9591057.434679] exe[890442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdcce87686 cs:33 sp:7efbf4d5ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [9591710.525264] exe[911979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f109e95686 cs:33 sp:7f7a953f48e8 ax:ffffffffff600000 si:7f7a953f4e08 di:ffffffffff600000 [9591710.574567] exe[878045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f109e95686 cs:33 sp:7f7a953d38e8 ax:ffffffffff600000 si:7f7a953d3e08 di:ffffffffff600000 [9591710.619067] exe[890747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f109e95686 cs:33 sp:7f7a953f48e8 ax:ffffffffff600000 si:7f7a953f4e08 di:ffffffffff600000 [9591863.703415] exe[896183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570cb355686 cs:33 sp:7eb32f01f8e8 ax:ffffffffff600000 si:7eb32f01fe08 di:ffffffffff600000 [9591959.899129] exe[839641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561280f77686 cs:33 sp:7f84750848e8 ax:ffffffffff600000 si:7f8475084e08 di:ffffffffff600000 [9592122.195457] exe[925458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e995cb686 cs:33 sp:7f8285e4e8e8 ax:ffffffffff600000 si:7f8285e4ee08 di:ffffffffff600000 [9592154.646296] exe[934788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6e2368686 cs:33 sp:7f89dc9fe8e8 ax:ffffffffff600000 si:7f89dc9fee08 di:ffffffffff600000 [9592168.348253] exe[907447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559723db6686 cs:33 sp:7f1ea52398e8 ax:ffffffffff600000 si:7f1ea5239e08 di:ffffffffff600000 [9592250.523165] exe[927644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559234038686 cs:33 sp:7f02fb10c8e8 ax:ffffffffff600000 si:7f02fb10ce08 di:ffffffffff600000 [9592250.889334] exe[886591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f83958e686 cs:33 sp:7f0af00b18e8 ax:ffffffffff600000 si:7f0af00b1e08 di:ffffffffff600000 [9592251.769525] exe[882636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cea5a2686 cs:33 sp:7f15f86e08e8 ax:ffffffffff600000 si:7f15f86e0e08 di:ffffffffff600000 [9592255.911322] exe[941861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1adb64686 cs:33 sp:7eeb1de9b8e8 ax:ffffffffff600000 si:7eeb1de9be08 di:ffffffffff600000 [9592259.878338] exe[893189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad7de38686 cs:33 sp:7f84b6acb8e8 ax:ffffffffff600000 si:7f84b6acbe08 di:ffffffffff600000 [9592312.510430] exe[887334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606a7a59686 cs:33 sp:7ea5238488e8 ax:ffffffffff600000 si:7ea523848e08 di:ffffffffff600000 [9592319.171473] exe[942878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4053b686 cs:33 sp:7f65bb70c8e8 ax:ffffffffff600000 si:7f65bb70ce08 di:ffffffffff600000 [9592531.303880] exe[852193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564569196686 cs:33 sp:7eef0ff408e8 ax:ffffffffff600000 si:7eef0ff40e08 di:ffffffffff600000 [9592940.279005] exe[951254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4475eb686 cs:33 sp:7f163fffe8e8 ax:ffffffffff600000 si:7f163fffee08 di:ffffffffff600000 [9592940.391485] exe[946716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4475eb686 cs:33 sp:7f163ffdd8e8 ax:ffffffffff600000 si:7f163ffdde08 di:ffffffffff600000 [9592940.486188] exe[948632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4475eb686 cs:33 sp:7f163fffe8e8 ax:ffffffffff600000 si:7f163fffee08 di:ffffffffff600000 [9593332.949643] exe[936568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629d9975686 cs:33 sp:7f90f28f08e8 ax:ffffffffff600000 si:7f90f28f0e08 di:ffffffffff600000 [9593333.058250] exe[936734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629d9975686 cs:33 sp:7f90f28f08e8 ax:ffffffffff600000 si:7f90f28f0e08 di:ffffffffff600000 [9593333.157652] exe[946589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629d9975686 cs:33 sp:7f90f28f08e8 ax:ffffffffff600000 si:7f90f28f0e08 di:ffffffffff600000 [9593333.188674] exe[944426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629d9975686 cs:33 sp:7f90f28f08e8 ax:ffffffffff600000 si:7f90f28f0e08 di:ffffffffff600000 [9593864.977216] exe[979026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644887ed686 cs:33 sp:7f8e82a5c8e8 ax:ffffffffff600000 si:7f8e82a5ce08 di:ffffffffff600000 [9593897.700726] exe[968259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f629fb6686 cs:33 sp:7feb6a4c28e8 ax:ffffffffff600000 si:7feb6a4c2e08 di:ffffffffff600000 [9593897.760296] exe[968259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f629fb6686 cs:33 sp:7feb6a4c28e8 ax:ffffffffff600000 si:7feb6a4c2e08 di:ffffffffff600000 [9593897.813451] exe[968107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f629fb6686 cs:33 sp:7feb6a4c28e8 ax:ffffffffff600000 si:7feb6a4c2e08 di:ffffffffff600000 [9594074.556700] exe[983552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563cbe3dd686 cs:33 sp:7ffb757ed8e8 ax:ffffffffff600000 si:7ffb757ede08 di:ffffffffff600000 [9594074.640559] exe[985808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563cbe3dd686 cs:33 sp:7ffb757ab8e8 ax:ffffffffff600000 si:7ffb757abe08 di:ffffffffff600000 [9594074.699682] exe[983269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563cbe3dd686 cs:33 sp:7ffb757ab8e8 ax:ffffffffff600000 si:7ffb757abe08 di:ffffffffff600000 [9594298.345255] exe[988742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55627f45f686 cs:33 sp:7fdfc7c77f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [9594298.419980] exe[988940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55627f45f686 cs:33 sp:7fdfc7c56f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [9594298.526243] exe[984911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55627f45f686 cs:33 sp:7fdfc7c77f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [9594853.094098] exe[990533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f629fb6686 cs:33 sp:7feb6a4c28e8 ax:ffffffffff600000 si:7feb6a4c2e08 di:ffffffffff600000 [9594853.145672] exe[991537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f629fb6686 cs:33 sp:7feb6a4c28e8 ax:ffffffffff600000 si:7feb6a4c2e08 di:ffffffffff600000 [9594853.196358] exe[990533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f629fb6686 cs:33 sp:7feb6a4c28e8 ax:ffffffffff600000 si:7feb6a4c2e08 di:ffffffffff600000 [9595741.512754] exe[987592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b579dc1686 cs:33 sp:7ecf8b421f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9595741.593473] exe[988698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b579dc1686 cs:33 sp:7ecf8b421f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9595741.593550] exe[19774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b579dc1686 cs:33 sp:7ecf8affef88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9595742.427915] exe[987371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b579dc1686 cs:33 sp:7ecf8b421f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [9596924.298838] exe[983377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2d4a58686 cs:33 sp:7ef0e61368e8 ax:ffffffffff600000 si:7ef0e6136e08 di:ffffffffff600000 [9596924.400953] exe[970248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2d4a58686 cs:33 sp:7ef0e61368e8 ax:ffffffffff600000 si:7ef0e6136e08 di:ffffffffff600000 [9596924.506023] exe[985941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2d4a58686 cs:33 sp:7ef0e61368e8 ax:ffffffffff600000 si:7ef0e6136e08 di:ffffffffff600000 [9596924.507913] exe[11535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2d4a58686 cs:33 sp:7ef0e61158e8 ax:ffffffffff600000 si:7ef0e6115e08 di:ffffffffff600000 [9596958.547315] exe[36262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2878a4686 cs:33 sp:7f71419558e8 ax:ffffffffff600000 si:7f7141955e08 di:ffffffffff600000 [9596965.973936] exe[20430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561899c41686 cs:33 sp:7fc663cc28e8 ax:ffffffffff600000 si:7fc663cc2e08 di:ffffffffff600000 [9596966.093938] exe[30510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561899c41686 cs:33 sp:7fc6637fe8e8 ax:ffffffffff600000 si:7fc6637fee08 di:ffffffffff600000 [9596966.176524] exe[5866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561899c41686 cs:33 sp:7fc663ca18e8 ax:ffffffffff600000 si:7fc663ca1e08 di:ffffffffff600000 [9597171.963655] exe[33949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.010081] exe[33948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.030477] exe[33949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.051380] exe[37568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.073973] exe[37635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.095539] exe[33949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.116819] exe[13623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.138062] exe[37670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.158838] exe[33949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597172.180221] exe[13623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2c3a5d3e8 cs:33 sp:7eb21a492f90 ax:7eb21a493020 si:ffffffffff600000 di:55a2c3b17019 [9597297.042769] warn_bad_vsyscall: 58 callbacks suppressed [9597297.042773] exe[970134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a482f686 cs:33 sp:7ef7a25c08e8 ax:ffffffffff600000 si:7ef7a25c0e08 di:ffffffffff600000 [9597297.178070] exe[970196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a482f686 cs:33 sp:7ef7a259f8e8 ax:ffffffffff600000 si:7ef7a259fe08 di:ffffffffff600000 [9597297.295069] exe[970127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a482f686 cs:33 sp:7ef7a25c08e8 ax:ffffffffff600000 si:7ef7a25c0e08 di:ffffffffff600000 [9597337.652156] exe[31802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585815f5686 cs:33 sp:7f717eaa88e8 ax:ffffffffff600000 si:7f717eaa8e08 di:ffffffffff600000 [9597337.748171] exe[36199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585815f5686 cs:33 sp:7f717ea878e8 ax:ffffffffff600000 si:7f717ea87e08 di:ffffffffff600000 [9597337.837752] exe[31944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585815f5686 cs:33 sp:7f717eaa88e8 ax:ffffffffff600000 si:7f717eaa8e08 di:ffffffffff600000 [9598147.824305] exe[45386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c1af8e8 ax:ffffffffff600000 si:7eec2c1afe08 di:ffffffffff600000 [9598147.875061] exe[45363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598147.918047] exe[45323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598147.938344] exe[45363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598147.958585] exe[45386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598147.979616] exe[45330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598148.001399] exe[45386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598148.023047] exe[45363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598148.043729] exe[45386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598148.064515] exe[45323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9598588.954454] warn_bad_vsyscall: 25 callbacks suppressed [9598588.954458] exe[95419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec2d06f686 cs:33 sp:7f8fdf9f58e8 ax:ffffffffff600000 si:7f8fdf9f5e08 di:ffffffffff600000 [9598589.051314] exe[94515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec2d06f686 cs:33 sp:7f8fdf9f58e8 ax:ffffffffff600000 si:7f8fdf9f5e08 di:ffffffffff600000 [9598589.134833] exe[94515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec2d06f686 cs:33 sp:7f8fdf9f58e8 ax:ffffffffff600000 si:7f8fdf9f5e08 di:ffffffffff600000 [9599012.094458] exe[45330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c1af8e8 ax:ffffffffff600000 si:7eec2c1afe08 di:ffffffffff600000 [9599012.130507] exe[45386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c1af8e8 ax:ffffffffff600000 si:7eec2c1afe08 di:ffffffffff600000 [9599012.170678] exe[51539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644987b5686 cs:33 sp:7eec2c18e8e8 ax:ffffffffff600000 si:7eec2c18ee08 di:ffffffffff600000 [9600411.839111] exe[124573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c45b0bf686 cs:33 sp:7ec9d2228f88 ax:ffffffffff600000 si:20000600 di:ffffffffff600000 [9600411.929694] exe[124489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c45b0bf686 cs:33 sp:7ec9d1dfef88 ax:ffffffffff600000 si:20000600 di:ffffffffff600000 [9600412.006392] exe[128775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c45b0bf686 cs:33 sp:7ec9d2228f88 ax:ffffffffff600000 si:20000600 di:ffffffffff600000 [9600573.096452] exe[132281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558365b6e3e8 cs:33 sp:7f5ad8939f90 ax:7f5ad893a020 si:ffffffffff600000 di:558365c28019 [9600573.171242] exe[76816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558365b6e3e8 cs:33 sp:7f5ad8939f90 ax:7f5ad893a020 si:ffffffffff600000 di:558365c28019 [9600573.202619] exe[102952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558365b6e3e8 cs:33 sp:7f5ad8939f90 ax:7f5ad893a020 si:ffffffffff600000 di:558365c28019 [9600573.279544] exe[123204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558365b6e3e8 cs:33 sp:7f5ad8939f90 ax:7f5ad893a020 si:ffffffffff600000 di:558365c28019 [9600577.751986] exe[76632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600577.829066] exe[75859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600577.901673] exe[75751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600577.978100] exe[132315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.048618] exe[124533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.121927] exe[76667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.200755] exe[75500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.269139] exe[75528] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.339455] exe[124325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.425541] exe[76630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.508356] exe[124563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.577477] exe[76630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.654175] exe[75747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.737757] exe[75487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600578.811379] exe[132310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55842e0ce3e8 cs:33 sp:7f8999ee8f90 ax:7f8999ee9020 si:ffffffffff600000 di:55842e188019 [9600789.791067] warn_bad_vsyscall: 6 callbacks suppressed [9600789.791070] exe[134978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557be18d8686 cs:33 sp:7fbd74fd4f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [9600789.963132] exe[90471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557be18d8686 cs:33 sp:7fbd74fb3f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [9600790.100806] exe[118418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557be18d8686 cs:33 sp:7fbd74fb3f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [9600867.812155] exe[58842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c45b0bf686 cs:33 sp:7ec9d22288e8 ax:ffffffffff600000 si:7ec9d2228e08 di:ffffffffff600000 [9600868.597609] exe[127803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c45b0bf686 cs:33 sp:7ec9d22288e8 ax:ffffffffff600000 si:7ec9d2228e08 di:ffffffffff600000 [9600868.651537] exe[127800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c45b0bf686 cs:33 sp:7ec9d22288e8 ax:ffffffffff600000 si:7ec9d2228e08 di:ffffffffff600000 [9602044.170930] exe[195278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2056e8e8 ax:ffffffffff600000 si:7fbd2056ee08 di:ffffffffff600000 [9602044.279237] exe[195278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2056e8e8 ax:ffffffffff600000 si:7fbd2056ee08 di:ffffffffff600000 [9602044.402276] exe[195146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2054d8e8 ax:ffffffffff600000 si:7fbd2054de08 di:ffffffffff600000 [9602336.048356] exe[194536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f4b767686 cs:33 sp:7fdd03b418e8 ax:ffffffffff600000 si:7fdd03b41e08 di:ffffffffff600000 [9602336.814385] exe[197839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f4b767686 cs:33 sp:7fdd03b418e8 ax:ffffffffff600000 si:7fdd03b41e08 di:ffffffffff600000 [9602336.904694] exe[199571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f4b767686 cs:33 sp:7fdd03aff8e8 ax:ffffffffff600000 si:7fdd03affe08 di:ffffffffff600000 [9602624.308685] exe[193682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aad3d943e8 cs:33 sp:7ee272554f90 ax:7ee272555020 si:ffffffffff600000 di:55aad3e4e019 [9602624.483085] exe[182098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aad3d943e8 cs:33 sp:7ee272533f90 ax:7ee272534020 si:ffffffffff600000 di:55aad3e4e019 [9602624.738824] exe[181964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aad3d943e8 cs:33 sp:7ee272554f90 ax:7ee272555020 si:ffffffffff600000 di:55aad3e4e019 [9602735.804726] exe[142890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba598a93e8 cs:33 sp:7edaadaeaf90 ax:7edaadaeb020 si:ffffffffff600000 di:55ba59963019 [9602735.847153] exe[149329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba598a93e8 cs:33 sp:7edaadaeaf90 ax:7edaadaeb020 si:ffffffffff600000 di:55ba59963019 [9602736.678553] exe[202707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba598a93e8 cs:33 sp:7edaadaeaf90 ax:7edaadaeb020 si:ffffffffff600000 di:55ba59963019 [9602753.367714] exe[141995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da63a8e8 ax:ffffffffff600000 si:7f63da63ae08 di:ffffffffff600000 [9602753.468120] exe[141896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.490681] exe[141896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.512007] exe[141896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.534605] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.555710] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.579145] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.600283] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.621695] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602753.642110] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b05fcb5686 cs:33 sp:7f63da1dd8e8 ax:ffffffffff600000 si:7f63da1dde08 di:ffffffffff600000 [9602759.009961] warn_bad_vsyscall: 189 callbacks suppressed [9602759.009964] exe[172358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602759.067655] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602759.867719] exe[155393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602759.951453] exe[166259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602760.000934] exe[173690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602760.074329] exe[155068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602760.124939] exe[172353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602760.184177] exe[141850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602760.230505] exe[142001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602760.272079] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.012567] warn_bad_vsyscall: 85 callbacks suppressed [9602764.012570] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.041169] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.062576] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.084105] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.106330] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.128521] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.150428] exe[141857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.236780] exe[141990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.295854] exe[142001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602764.354539] exe[201173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.037357] warn_bad_vsyscall: 310 callbacks suppressed [9602769.037361] exe[173678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.096618] exe[172358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.164277] exe[162237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.213185] exe[142688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.266494] exe[141889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.333512] exe[155072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.417483] exe[146494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.494347] exe[172353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.566266] exe[155063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602769.638482] exe[146591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9602774.522797] warn_bad_vsyscall: 208 callbacks suppressed [9602774.522801] exe[141889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602774.552801] exe[166173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.330419] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.352309] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.373808] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.396522] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.418030] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.439752] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.461804] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9602775.483817] exe[166249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd352e8e8 ax:ffffffffff600000 si:7efdd352ee08 di:ffffffffff600000 [9603119.651123] warn_bad_vsyscall: 33 callbacks suppressed [9603119.651128] exe[145174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2056e8e8 ax:ffffffffff600000 si:7fbd2056ee08 di:ffffffffff600000 [9603119.769770] exe[201348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2056e8e8 ax:ffffffffff600000 si:7fbd2056ee08 di:ffffffffff600000 [9603119.817180] exe[200910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2054d8e8 ax:ffffffffff600000 si:7fbd2054de08 di:ffffffffff600000 [9603119.913909] exe[149704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2056e8e8 ax:ffffffffff600000 si:7fbd2056ee08 di:ffffffffff600000 [9603119.916650] exe[158670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56237d6cd686 cs:33 sp:7fbd2054d8e8 ax:ffffffffff600000 si:7fbd2054de08 di:ffffffffff600000 [9603669.539268] exe[141932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9603669.587617] exe[162350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9603669.656375] exe[142083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611f1a90686 cs:33 sp:7efdd354f8e8 ax:ffffffffff600000 si:7efdd354fe08 di:ffffffffff600000 [9604386.404387] exe[176897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559325f5c3e8 cs:33 sp:7fecc53d6f90 ax:7fecc53d7020 si:ffffffffff600000 di:559326016019 [9604387.207602] exe[177273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559325f5c3e8 cs:33 sp:7fecc53d6f90 ax:7fecc53d7020 si:ffffffffff600000 di:559326016019 [9604387.244336] exe[176994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559325f5c3e8 cs:33 sp:7fecc53d6f90 ax:7fecc53d7020 si:ffffffffff600000 di:559326016019 [9604387.346326] exe[176970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559325f5c3e8 cs:33 sp:7fecc53d6f90 ax:7fecc53d7020 si:ffffffffff600000 di:559326016019 [9604387.388158] exe[186367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559325f5c3e8 cs:33 sp:7fecc53d6f90 ax:7fecc53d7020 si:ffffffffff600000 di:559326016019 [9604573.185248] exe[217048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560139752686 cs:33 sp:7f1133293f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9604573.354533] exe[216931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560139752686 cs:33 sp:7f1133293f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9604573.397311] exe[217090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560139752686 cs:33 sp:7f1133251f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9604574.062668] exe[160488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560139752686 cs:33 sp:7f1133293f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9604574.101831] exe[160400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560139752686 cs:33 sp:7f1133272f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [9604780.368234] exe[243947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620534bf686 cs:33 sp:7ebe0c2b98e8 ax:ffffffffff600000 si:7ebe0c2b9e08 di:ffffffffff600000 [9604780.420696] exe[243959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620534bf686 cs:33 sp:7ebe0c2988e8 ax:ffffffffff600000 si:7ebe0c298e08 di:ffffffffff600000 [9604781.229113] exe[255715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620534bf686 cs:33 sp:7ebe0c2988e8 ax:ffffffffff600000 si:7ebe0c298e08 di:ffffffffff600000 [9605166.028633] exe[269054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e826ac23e8 cs:33 sp:7edd9cc5ff90 ax:7edd9cc60020 si:ffffffffff600000 di:55e826b7c019 [9605166.082671] exe[273900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e826ac23e8 cs:33 sp:7edd9cc5ff90 ax:7edd9cc60020 si:ffffffffff600000 di:55e826b7c019 [9605166.900521] exe[269034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e826ac23e8 cs:33 sp:7edd9cc5ff90 ax:7edd9cc60020 si:ffffffffff600000 di:55e826b7c019 [9605754.354184] exe[286835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc51987686 cs:33 sp:7ec8eddfd8e8 ax:ffffffffff600000 si:7ec8eddfde08 di:ffffffffff600000 [9605754.409629] exe[266444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc51987686 cs:33 sp:7ec8eddfd8e8 ax:ffffffffff600000 si:7ec8eddfde08 di:ffffffffff600000 [9605754.462074] exe[273459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc51987686 cs:33 sp:7ec8eddfd8e8 ax:ffffffffff600000 si:7ec8eddfde08 di:ffffffffff600000 [9606326.590002] exe[284256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561be451a3e8 cs:33 sp:7f6fb893cf90 ax:7f6fb893d020 si:ffffffffff600000 di:561be45d4019 [9606326.673112] exe[284243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561be451a3e8 cs:33 sp:7f6fb893cf90 ax:7f6fb893d020 si:ffffffffff600000 di:561be45d4019 [9606327.460852] exe[298068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561be451a3e8 cs:33 sp:7f6fb88faf90 ax:7f6fb88fb020 si:ffffffffff600000 di:561be45d4019 [9606327.461021] exe[284254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561be451a3e8 cs:33 sp:7f6fb891bf90 ax:7f6fb891c020 si:ffffffffff600000 di:561be45d4019 [9607224.568731] exe[318073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55846718e686 cs:33 sp:7f88798bdf88 ax:ffffffffff600000 si:20002a00 di:ffffffffff600000 [9607224.630536] exe[318073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55846718e686 cs:33 sp:7f88798bdf88 ax:ffffffffff600000 si:20002a00 di:ffffffffff600000 [9607224.696325] exe[289795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55846718e686 cs:33 sp:7f887989cf88 ax:ffffffffff600000 si:20002a00 di:ffffffffff600000 [9607224.697039] exe[245541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55846718e686 cs:33 sp:7f88798bdf88 ax:ffffffffff600000 si:20002a00 di:ffffffffff600000 [9607250.553777] exe[320937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.776771] exe[288985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.798763] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.821660] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.843983] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.871049] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.895142] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.917642] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.939048] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607250.960944] exe[287892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566c2480686 cs:33 sp:7ff026ffe8e8 ax:ffffffffff600000 si:7ff026ffee08 di:ffffffffff600000 [9607301.004241] warn_bad_vsyscall: 25 callbacks suppressed [9607301.004245] exe[332759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.100588] exe[268985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d178e8 ax:ffffffffff600000 si:7f0ed5d17e08 di:ffffffffff600000 [9607301.197136] exe[332779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.228550] exe[332760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.261396] exe[332745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.294803] exe[332996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.332883] exe[332760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.362151] exe[332760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.392706] exe[332760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9607301.424393] exe[332929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811fdbd686 cs:33 sp:7f0ed5d388e8 ax:ffffffffff600000 si:7f0ed5d38e08 di:ffffffffff600000 [9608401.237622] warn_bad_vsyscall: 57 callbacks suppressed [9608401.237625] exe[331082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559548272686 cs:33 sp:7f338428f8e8 ax:ffffffffff600000 si:7f338428fe08 di:ffffffffff600000 [9608401.370537] exe[340974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559548272686 cs:33 sp:7f338422c8e8 ax:ffffffffff600000 si:7f338422ce08 di:ffffffffff600000 [9608402.134023] exe[334742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559548272686 cs:33 sp:7f338428f8e8 ax:ffffffffff600000 si:7f338428fe08 di:ffffffffff600000 [9609209.284611] exe[418259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e3f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9609209.420198] exe[400762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e3f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9609209.504069] exe[421636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e3f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [9609621.383370] exe[407379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e77205686 cs:33 sp:7fc1413fd8e8 ax:ffffffffff600000 si:7fc1413fde08 di:ffffffffff600000 [9609621.551654] exe[373237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e77205686 cs:33 sp:7fc1413fd8e8 ax:ffffffffff600000 si:7fc1413fde08 di:ffffffffff600000 [9609621.740442] exe[414717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e77205686 cs:33 sp:7fc1413fd8e8 ax:ffffffffff600000 si:7fc1413fde08 di:ffffffffff600000 [9610389.840644] exe[401618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574adc04686 cs:33 sp:7f68ca2d88e8 ax:ffffffffff600000 si:7f68ca2d8e08 di:ffffffffff600000 [9610389.901700] exe[404789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574adc04686 cs:33 sp:7f68ca2d88e8 ax:ffffffffff600000 si:7f68ca2d8e08 di:ffffffffff600000 [9610389.924568] exe[401540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574adc04686 cs:33 sp:7f68ca2d88e8 ax:ffffffffff600000 si:7f68ca2d8e08 di:ffffffffff600000 [9610389.986950] exe[401618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574adc04686 cs:33 sp:7f68ca2d88e8 ax:ffffffffff600000 si:7f68ca2d8e08 di:ffffffffff600000 [9610390.009438] exe[423609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574adc04686 cs:33 sp:7f68ca2d88e8 ax:ffffffffff600000 si:7f68ca2d8e08 di:ffffffffff600000 [9610696.104113] exe[450628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e43d0b686 cs:33 sp:7fb8abe938e8 ax:ffffffffff600000 si:7fb8abe93e08 di:ffffffffff600000 [9610696.180900] exe[450599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e43d0b686 cs:33 sp:7fb8abe728e8 ax:ffffffffff600000 si:7fb8abe72e08 di:ffffffffff600000 [9610696.312233] exe[450469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e43d0b686 cs:33 sp:7fb8abe938e8 ax:ffffffffff600000 si:7fb8abe93e08 di:ffffffffff600000 [9610727.872496] exe[404401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784173e686 cs:33 sp:7ee10f5418e8 ax:ffffffffff600000 si:7ee10f541e08 di:ffffffffff600000 [9610727.919156] exe[399083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784173e686 cs:33 sp:7ee10f5418e8 ax:ffffffffff600000 si:7ee10f541e08 di:ffffffffff600000 [9610727.965859] exe[399083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784173e686 cs:33 sp:7ee10f5418e8 ax:ffffffffff600000 si:7ee10f541e08 di:ffffffffff600000 [9610921.318315] exe[459590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559036f5f391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10102000 [9610921.365141] exe[441627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559036f5f391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10102000 [9610921.445247] exe[439855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559036f5f391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10102000 [9611197.573935] exe[380940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94718e8 ax:ffffffffff600000 si:7fa3e9471e08 di:ffffffffff600000 [9611197.629580] exe[363910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.649984] exe[363910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.671097] exe[380727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.693132] exe[380727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.718122] exe[363779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.740834] exe[363779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.762845] exe[363779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.783367] exe[363779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611197.804964] exe[363779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55936c164686 cs:33 sp:7fa3e94508e8 ax:ffffffffff600000 si:7fa3e9450e08 di:ffffffffff600000 [9611211.722167] warn_bad_vsyscall: 57 callbacks suppressed [9611211.722170] exe[445278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611211.817839] exe[363851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611211.873364] exe[425452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611211.935961] exe[425452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611212.009123] exe[400761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611212.075925] exe[400759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611212.136382] exe[370911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611212.202791] exe[363851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611212.263085] exe[381885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611212.343699] exe[366015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611216.739917] warn_bad_vsyscall: 78 callbacks suppressed [9611216.739920] exe[441730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611216.912498] exe[380943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611217.001880] exe[385813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611217.086777] exe[401573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611217.140396] exe[363816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611217.164594] exe[365963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611219.028678] exe[363851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611219.899236] exe[388234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611219.967437] exe[363816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611220.021762] exe[363816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611221.780724] warn_bad_vsyscall: 69 callbacks suppressed [9611221.780727] exe[363803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611221.860098] exe[363798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611221.884068] exe[369447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611221.943326] exe[363783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611222.005160] exe[363808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611222.072763] exe[363798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611222.159312] exe[380930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611222.180749] exe[363807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611222.210797] exe[363807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611222.237150] exe[363807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611226.834555] warn_bad_vsyscall: 161 callbacks suppressed [9611226.834558] exe[365912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611226.972457] exe[418257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.082245] exe[400794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611227.155409] exe[371246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.223111] exe[363851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.318315] exe[371049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.396091] exe[400762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.458388] exe[371049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.520619] exe[363800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611227.579520] exe[423832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611231.837918] warn_bad_vsyscall: 121 callbacks suppressed [9611231.837922] exe[431717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.599739] exe[401573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.663949] exe[401570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.709021] exe[385813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.763019] exe[401570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611232.827830] exe[401569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.872226] exe[381275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.968287] exe[369439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611232.998563] exe[363783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611233.061933] exe[431713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611236.864805] warn_bad_vsyscall: 96 callbacks suppressed [9611236.864809] exe[363872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611236.901759] exe[363793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611237.000131] exe[400780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611237.072909] exe[400762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611237.138463] exe[381899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611237.170653] exe[365960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611237.260553] exe[363872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611237.961253] exe[371253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611238.017672] exe[363808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611238.829852] exe[381809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611241.979808] warn_bad_vsyscall: 134 callbacks suppressed [9611241.979810] exe[382020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611242.674191] exe[385813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611242.726610] exe[363748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611242.750002] exe[370923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611243.540920] exe[363793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611243.676323] exe[401570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611243.710947] exe[401569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611244.417064] exe[363872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611244.417704] exe[363748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611246.036141] exe[380856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611246.981896] warn_bad_vsyscall: 15 callbacks suppressed [9611246.981899] exe[418267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.010146] exe[401862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.079957] exe[365910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.145672] exe[369447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.214528] exe[423830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611247.214874] exe[363890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.327725] exe[363835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.422517] exe[401573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.455979] exe[401862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5e38e8 ax:ffffffffff600000 si:7fb57a5e3e08 di:ffffffffff600000 [9611247.527787] exe[365991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a149610686 cs:33 sp:7fb57a5c28e8 ax:ffffffffff600000 si:7fb57a5c2e08 di:ffffffffff600000 [9611950.486202] warn_bad_vsyscall: 134 callbacks suppressed [9611950.486205] exe[473997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a17da0686 cs:33 sp:7f528a11ff88 ax:ffffffffff600000 si:20000500 di:ffffffffff600000 [9611950.557135] exe[477241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a17da0686 cs:33 sp:7f528a11ff88 ax:ffffffffff600000 si:20000500 di:ffffffffff600000 [9611950.593850] exe[479946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a17da0686 cs:33 sp:7f528a11ff88 ax:ffffffffff600000 si:20000500 di:ffffffffff600000 [9611951.346975] exe[472485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a17da0686 cs:33 sp:7f528a11ff88 ax:ffffffffff600000 si:20000500 di:ffffffffff600000 [9611951.377302] exe[472485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a17da0686 cs:33 sp:7f528a11ff88 ax:ffffffffff600000 si:20000500 di:ffffffffff600000 [9612479.966056] exe[513812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f541fe1686 cs:33 sp:7f0735ccd8e8 ax:ffffffffff600000 si:7f0735ccde08 di:ffffffffff600000 [9612480.052869] exe[504001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f541fe1686 cs:33 sp:7f0735ccd8e8 ax:ffffffffff600000 si:7f0735ccde08 di:ffffffffff600000 [9612480.118734] exe[506046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f541fe1686 cs:33 sp:7f0735ccd8e8 ax:ffffffffff600000 si:7f0735ccde08 di:ffffffffff600000 [9612480.147763] exe[506048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f541fe1686 cs:33 sp:7f0735c498e8 ax:ffffffffff600000 si:7f0735c49e08 di:ffffffffff600000 [9612508.678796] exe[505974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612508.756275] exe[508271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612508.857470] exe[503878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612508.957975] exe[505974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612509.712340] exe[478660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612509.796736] exe[504904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612510.603957] exe[513827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612510.664720] exe[481657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612511.460563] exe[504690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612511.529438] exe[506037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22bb9e686 cs:33 sp:7fe2d4cef8e8 ax:ffffffffff600000 si:7fe2d4cefe08 di:ffffffffff600000 [9612624.428157] warn_bad_vsyscall: 5 callbacks suppressed [9612624.428161] exe[508314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c65bbe6686 cs:33 sp:7f66e1032f88 ax:ffffffffff600000 si:20000440 di:ffffffffff600000 [9612624.657731] exe[444617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c65bbe6686 cs:33 sp:7f66e1032f88 ax:ffffffffff600000 si:20000440 di:ffffffffff600000 [9612624.757559] exe[504368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c65bbe6686 cs:33 sp:7f66e1032f88 ax:ffffffffff600000 si:20000440 di:ffffffffff600000 [9613591.230207] exe[526477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fadfd686 cs:33 sp:7f57960b18e8 ax:ffffffffff600000 si:7f57960b1e08 di:ffffffffff600000 [9613591.297421] exe[525656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fadfd686 cs:33 sp:7f57960908e8 ax:ffffffffff600000 si:7f5796090e08 di:ffffffffff600000 [9613591.363944] exe[527074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fadfd686 cs:33 sp:7f57960b18e8 ax:ffffffffff600000 si:7f57960b1e08 di:ffffffffff600000 [9614194.349645] exe[472568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1d024686 cs:33 sp:7feaa85ca8e8 ax:ffffffffff600000 si:7feaa85cae08 di:ffffffffff600000 [9614194.434933] exe[539952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1d024686 cs:33 sp:7feaa85678e8 ax:ffffffffff600000 si:7feaa8567e08 di:ffffffffff600000 [9614194.435131] exe[519349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1d024686 cs:33 sp:7feaa85888e8 ax:ffffffffff600000 si:7feaa8588e08 di:ffffffffff600000 [9614194.576305] exe[479431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1d024686 cs:33 sp:7feaa85a98e8 ax:ffffffffff600000 si:7feaa85a9e08 di:ffffffffff600000 [9614194.576545] exe[477729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e1d024686 cs:33 sp:7feaa85ca8e8 ax:ffffffffff600000 si:7feaa85cae08 di:ffffffffff600000 [9614268.532450] exe[533604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b8cd15686 cs:33 sp:7fd56e25ef88 ax:ffffffffff600000 si:20007cc0 di:ffffffffff600000 [9614268.677259] exe[533832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b8cd15686 cs:33 sp:7fd56e25ef88 ax:ffffffffff600000 si:20007cc0 di:ffffffffff600000 [9614269.249313] exe[536419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b8cd15686 cs:33 sp:7fd56e23df88 ax:ffffffffff600000 si:20007cc0 di:ffffffffff600000 [9614276.916329] exe[540919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd3f58c686 cs:33 sp:7f4ecd9cb8e8 ax:ffffffffff600000 si:7f4ecd9cbe08 di:ffffffffff600000 [9614277.062490] exe[541534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f9b7cf686 cs:33 sp:7f724b2f08e8 ax:ffffffffff600000 si:7f724b2f0e08 di:ffffffffff600000 [9614277.063535] exe[541025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd3f58c686 cs:33 sp:7f4ecd9cb8e8 ax:ffffffffff600000 si:7f4ecd9cbe08 di:ffffffffff600000 [9614277.122555] exe[540988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd3f58c686 cs:33 sp:7f4ecd9cb8e8 ax:ffffffffff600000 si:7f4ecd9cbe08 di:ffffffffff600000 [9614277.198311] exe[541413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd3f58c686 cs:33 sp:7f4ecd9cb8e8 ax:ffffffffff600000 si:7f4ecd9cbe08 di:ffffffffff600000 [9614752.980430] exe[544418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116d020f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.093959] exe[544419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.114400] exe[544419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.135741] exe[544419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.157080] exe[544419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.180217] exe[544418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.201807] exe[544418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.224186] exe[544418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.247417] exe[544418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9614753.270342] exe[544418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddfb5f9686 cs:33 sp:7f116cbfef88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [9615266.171865] warn_bad_vsyscall: 89 callbacks suppressed [9615266.171868] exe[571299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605fb70f686 cs:33 sp:7f381b34e8e8 ax:ffffffffff600000 si:7f381b34ee08 di:ffffffffff600000 [9615266.935251] exe[571672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605fb70f686 cs:33 sp:7f381b34e8e8 ax:ffffffffff600000 si:7f381b34ee08 di:ffffffffff600000 [9615266.970181] exe[569330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605fb70f686 cs:33 sp:7f381b32d8e8 ax:ffffffffff600000 si:7f381b32de08 di:ffffffffff600000 [9615267.053139] exe[571202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605fb70f686 cs:33 sp:7f381b34e8e8 ax:ffffffffff600000 si:7f381b34ee08 di:ffffffffff600000 [9615267.088624] exe[571202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605fb70f686 cs:33 sp:7f381b32d8e8 ax:ffffffffff600000 si:7f381b32de08 di:ffffffffff600000 [9615367.711318] exe[552105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615709813e8 cs:33 sp:7fd04eaccf90 ax:7fd04eacd020 si:ffffffffff600000 di:561570a3b019 [9615367.776308] exe[528159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615709813e8 cs:33 sp:7fd04eaccf90 ax:7fd04eacd020 si:ffffffffff600000 di:561570a3b019 [9615367.814489] exe[528572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615709813e8 cs:33 sp:7fd04eaccf90 ax:7fd04eacd020 si:ffffffffff600000 di:561570a3b019 [9615367.884171] exe[547964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615709813e8 cs:33 sp:7fd04eaccf90 ax:7fd04eacd020 si:ffffffffff600000 di:561570a3b019 [9615936.569046] exe[560317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3b97ea686 cs:33 sp:7f28d25fe8e8 ax:ffffffffff600000 si:7f28d25fee08 di:ffffffffff600000 [9615936.650285] exe[561176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3b97ea686 cs:33 sp:7f28d25fe8e8 ax:ffffffffff600000 si:7f28d25fee08 di:ffffffffff600000 [9615937.408826] exe[573982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3b97ea686 cs:33 sp:7f28d25fe8e8 ax:ffffffffff600000 si:7f28d25fee08 di:ffffffffff600000 [9616504.180505] exe[656850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee1a59c686 cs:33 sp:7fdcb16c18e8 ax:ffffffffff600000 si:7fdcb16c1e08 di:ffffffffff600000 [9616504.268490] exe[656807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee1a59c686 cs:33 sp:7fdcb16c18e8 ax:ffffffffff600000 si:7fdcb16c1e08 di:ffffffffff600000 [9616504.361663] exe[632395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee1a59c686 cs:33 sp:7fdcb16c18e8 ax:ffffffffff600000 si:7fdcb16c1e08 di:ffffffffff600000 [9616504.450088] exe[657846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee1a59c686 cs:33 sp:7fdcb16c18e8 ax:ffffffffff600000 si:7fdcb16c1e08 di:ffffffffff600000 [9616663.447697] exe[630957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56359e943686 cs:33 sp:7f51f80918e8 ax:ffffffffff600000 si:7f51f8091e08 di:ffffffffff600000 [9616663.509851] exe[658823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56359e943686 cs:33 sp:7f51f80918e8 ax:ffffffffff600000 si:7f51f8091e08 di:ffffffffff600000 [9616663.567755] exe[630957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56359e943686 cs:33 sp:7f51f80918e8 ax:ffffffffff600000 si:7f51f8091e08 di:ffffffffff600000 [9616663.616917] exe[665515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56359e943686 cs:33 sp:7f51f80918e8 ax:ffffffffff600000 si:7f51f8091e08 di:ffffffffff600000 [9617752.152118] exe[641224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ca8ac0686 cs:33 sp:7fd80c6bb8e8 ax:ffffffffff600000 si:7fd80c6bbe08 di:ffffffffff600000 [9617752.207274] exe[696195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ca8ac0686 cs:33 sp:7fd80c6bb8e8 ax:ffffffffff600000 si:7fd80c6bbe08 di:ffffffffff600000 [9617752.270177] exe[696198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ca8ac0686 cs:33 sp:7fd80c6bb8e8 ax:ffffffffff600000 si:7fd80c6bbe08 di:ffffffffff600000 [9617752.353084] exe[696216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ca8ac0686 cs:33 sp:7fd80c6bb8e8 ax:ffffffffff600000 si:7fd80c6bbe08 di:ffffffffff600000 [9618266.303508] exe[697911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982558d686 cs:33 sp:7f53e55988e8 ax:ffffffffff600000 si:7f53e5598e08 di:ffffffffff600000 [9618266.409587] exe[711050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982558d686 cs:33 sp:7f53e55988e8 ax:ffffffffff600000 si:7f53e5598e08 di:ffffffffff600000 [9618266.512759] exe[704635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982558d686 cs:33 sp:7f53e55988e8 ax:ffffffffff600000 si:7f53e5598e08 di:ffffffffff600000 [9618266.606170] exe[704580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982558d686 cs:33 sp:7f53e55988e8 ax:ffffffffff600000 si:7f53e5598e08 di:ffffffffff600000 [9618515.025002] exe[690604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56359e943686 cs:33 sp:7f51f80918e8 ax:ffffffffff600000 si:7f51f8091e08 di:ffffffffff600000 [9618674.316154] exe[668219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f23563d686 cs:33 sp:7f574dbcd8e8 ax:ffffffffff600000 si:7f574dbcde08 di:ffffffffff600000 [9619195.006578] exe[695961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557a763b686 cs:33 sp:7fd9bbb058e8 ax:ffffffffff600000 si:7fd9bbb05e08 di:ffffffffff600000 [9621074.038276] exe[764466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56254f349686 cs:33 sp:7f4596c338e8 ax:ffffffffff600000 si:7f4596c33e08 di:ffffffffff600000 [9621151.814039] exe[754413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a62b17686 cs:33 sp:7fe2921d38e8 ax:ffffffffff600000 si:7fe2921d3e08 di:ffffffffff600000 [9621151.924675] exe[748467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a62b17686 cs:33 sp:7fe2921d38e8 ax:ffffffffff600000 si:7fe2921d3e08 di:ffffffffff600000 [9621151.989821] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597a8781686 cs:33 sp:7f3b76c4e8e8 ax:ffffffffff600000 si:7f3b76c4ee08 di:ffffffffff600000 [9621152.168848] exe[782017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a62b17686 cs:33 sp:7fe2921d38e8 ax:ffffffffff600000 si:7fe2921d3e08 di:ffffffffff600000 [9621152.225387] exe[789433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597a8781686 cs:33 sp:7f3b76c4e8e8 ax:ffffffffff600000 si:7f3b76c4ee08 di:ffffffffff600000 [9621152.303991] exe[776347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a300ee686 cs:33 sp:7f879fc7d8e8 ax:ffffffffff600000 si:7f879fc7de08 di:ffffffffff600000 [9621152.319175] exe[754290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a62b17686 cs:33 sp:7fe2921d38e8 ax:ffffffffff600000 si:7fe2921d3e08 di:ffffffffff600000 [9621152.373271] exe[748295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597a8781686 cs:33 sp:7f3b76c4e8e8 ax:ffffffffff600000 si:7f3b76c4ee08 di:ffffffffff600000 [9621152.408299] exe[778525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a300ee686 cs:33 sp:7f879fc7d8e8 ax:ffffffffff600000 si:7f879fc7de08 di:ffffffffff600000 [9621152.423605] exe[788416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594ebc0b686 cs:33 sp:7f8f24bfe8e8 ax:ffffffffff600000 si:7f8f24bfee08 di:ffffffffff600000 [9621727.078490] warn_bad_vsyscall: 3 callbacks suppressed [9621727.078494] exe[793652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c5e3f6686 cs:33 sp:7faf088b58e8 ax:ffffffffff600000 si:7faf088b5e08 di:ffffffffff600000 [9621829.698835] exe[793309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602ebb10686 cs:33 sp:7f35582a28e8 ax:ffffffffff600000 si:7f35582a2e08 di:ffffffffff600000 [9622302.951945] exe[829504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a300ee686 cs:33 sp:7f879fc7d8e8 ax:ffffffffff600000 si:7f879fc7de08 di:ffffffffff600000 [9622881.113085] exe[824405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ac91cd686 cs:33 sp:7f0f0049d8e8 ax:ffffffffff600000 si:7f0f0049de08 di:ffffffffff600000 [9622881.232105] exe[845791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ac91cd686 cs:33 sp:7f0f0049d8e8 ax:ffffffffff600000 si:7f0f0049de08 di:ffffffffff600000 [9622881.356569] exe[822931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ac91cd686 cs:33 sp:7f0f0047c8e8 ax:ffffffffff600000 si:7f0f0047ce08 di:ffffffffff600000 [9623757.528767] exe[873371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614fa4a23e8 cs:33 sp:7efe2b1d1f90 ax:7efe2b1d2020 si:ffffffffff600000 di:5614fa55c019 [9623757.635341] exe[870521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614fa4a23e8 cs:33 sp:7efe2b1d1f90 ax:7efe2b1d2020 si:ffffffffff600000 di:5614fa55c019 [9623757.635791] exe[870499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614fa4a23e8 cs:33 sp:7efe2b1b0f90 ax:7efe2b1b1020 si:ffffffffff600000 di:5614fa55c019 [9623757.773646] exe[893196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614fa4a23e8 cs:33 sp:7efe2b1d1f90 ax:7efe2b1d2020 si:ffffffffff600000 di:5614fa55c019 [9625274.067125] exe[868536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578ae00a391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625484.482342] exe[906670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55890773d391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625495.420561] exe[907485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ec64fa391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625681.209043] exe[870018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9ee947391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625695.611056] exe[893575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55734db1e391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625722.429981] exe[925509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e8d894391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625763.616262] exe[924286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a91da68391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625785.005268] exe[897483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f30dff4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625792.751174] exe[863834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630621dd391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625801.477072] exe[871673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e65f3c391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625834.211106] exe[904828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558483816391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625863.299875] exe[700406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564267fe9391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625866.565024] exe[911829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e6e717391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9625958.633870] exe[930523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613168c7391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9626002.883439] exe[846621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f5dfb1391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9626011.526790] exe[910805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4e5492391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20808000 [9626462.276943] exe[930057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ec64e9686 cs:33 sp:7ee1f7b0f8e8 ax:ffffffffff600000 si:7ee1f7b0fe08 di:ffffffffff600000 [9626463.142282] exe[930053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ec64e9686 cs:33 sp:7ee1f7b0f8e8 ax:ffffffffff600000 si:7ee1f7b0fe08 di:ffffffffff600000 [9626464.003475] exe[930053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ec64e9686 cs:33 sp:7ee1f7b0f8e8 ax:ffffffffff600000 si:7ee1f7b0fe08 di:ffffffffff600000 [9627922.559655] exe[987408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191483d391 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80028000 [9627922.766135] exe[975298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191483d391 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80028000 [9627922.854895] exe[987405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191483d391 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80028000 [9627923.012446] exe[986176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56191483d391 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:80028000 [9628371.299582] exe[981568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55feacba83e8 cs:33 sp:7f490fda2f90 ax:7f490fda3020 si:ffffffffff600000 di:55feacc62019 [9628417.050806] exe[957695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f23747d6f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.137761] exe[961686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.159195] exe[961686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.211588] exe[953420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.235063] exe[955122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.259203] exe[976565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.284189] exe[976565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.306455] exe[976565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.328851] exe[976565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628417.351597] exe[976565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616937a3686 cs:33 sp:7f2374752f88 ax:ffffffffff600000 si:20000800 di:ffffffffff600000 [9628500.056913] warn_bad_vsyscall: 57 callbacks suppressed [9628500.056917] exe[12349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f301b63e8 cs:33 sp:7ed8f1eccf90 ax:7ed8f1ecd020 si:ffffffffff600000 di:559f30270019 [9628502.336764] exe[991972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1613f03e8 cs:33 sp:7f80d99d9f90 ax:7f80d99da020 si:ffffffffff600000 di:55d1614aa019 [9628643.699815] exe[14081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f3d393e8 cs:33 sp:7f618389af90 ax:7f618389b020 si:ffffffffff600000 di:5586f3df3019