557 usertrap_amd64.go:122] [ 1378(16966): 1378(16966)] Allocate a new trap: 0xc0004751d0 41 D0706 16:21:21.982121 711557 usertrap_amd64.go:225] [ 1378(16966): 1378(16966)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:22.022020 711557 usertrap_amd64.go:212] [ 1380(17793): 1380(17793)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:22.026018 711557 usertrap_amd64.go:122] [ 1380(17793): 1380(17793)] Allocate a new trap: 0xc000475200 40 D0706 16:21:22.027425 711557 usertrap_amd64.go:225] [ 1380(17793): 1380(17793)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:22.028036 711557 usertrap_amd64.go:212] [ 1379(16320): 1379(16320)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:22.028159 711557 usertrap_amd64.go:122] [ 1379(16320): 1379(16320)] Allocate a new trap: 0xc00c210e70 40 D0706 16:21:22.029052 711557 usertrap_amd64.go:225] [ 1379(16320): 1379(16320)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:22.031428 711557 usertrap_amd64.go:212] [ 1378(16966): 1378(16966)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:22.031596 711557 usertrap_amd64.go:122] [ 1378(16966): 1378(16966)] Allocate a new trap: 0xc0004751d0 42 D0706 16:21:22.031681 711557 usertrap_amd64.go:225] [ 1378(16966): 1378(16966)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:22.034085 711557 usertrap_amd64.go:212] [ 1379(16320): 1379(16320)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:22.034163 711557 usertrap_amd64.go:122] [ 1379(16320): 1379(16320)] Allocate a new trap: 0xc00c210e70 41 D0706 16:21:22.034281 711557 usertrap_amd64.go:225] [ 1379(16320): 1379(16320)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:22.036827 711557 usertrap_amd64.go:212] [ 1380(17793): 1380(17793)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:22.036910 711557 usertrap_amd64.go:122] [ 1380(17793): 1380(17793)] Allocate a new trap: 0xc000475200 41 D0706 16:21:22.037026 711557 usertrap_amd64.go:225] [ 1380(17793): 1380(17793)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:22.047637 711557 usertrap_amd64.go:212] [ 1378(16966): 1381(16967)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:22.047709 711557 usertrap_amd64.go:122] [ 1378(16966): 1381(16967)] Allocate a new trap: 0xc0004751d0 43 D0706 16:21:22.047763 711557 usertrap_amd64.go:225] [ 1378(16966): 1381(16967)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:22.059806 711557 usertrap_amd64.go:212] [ 1379(16320): 1379(16320)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:22.059928 711557 usertrap_amd64.go:122] [ 1379(16320): 1379(16320)] Allocate a new trap: 0xc00c210e70 42 D0706 16:21:22.060016 711557 usertrap_amd64.go:225] [ 1379(16320): 1379(16320)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:22.060066 711557 usertrap_amd64.go:212] [ 1380(17793): 1380(17793)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:22.060161 711557 usertrap_amd64.go:122] [ 1380(17793): 1380(17793)] Allocate a new trap: 0xc000475200 42 D0706 16:21:22.060235 711557 usertrap_amd64.go:225] [ 1380(17793): 1380(17793)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:22.084282 711557 usertrap_amd64.go:212] [ 1379(16320): 1379(16320)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:22.084359 711557 usertrap_amd64.go:122] [ 1379(16320): 1379(16320)] Allocate a new trap: 0xc00c210e70 43 D0706 16:21:22.084486 711557 usertrap_amd64.go:225] [ 1379(16320): 1379(16320)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:22.090605 711557 task_exit.go:204] [ 1379(16320): 1379(16320)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.090959 711557 task_signals.go:204] [ 1379(16320): 1383(16321)] Signal 1379, PID: 1383, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.091086 711557 task_signals.go:204] [ 1379(16320): 1385(16323)] Signal 1379, PID: 1385, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.091208 711557 task_exit.go:204] [ 1379(16320): 1383(16321)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.091375 711557 task_signals.go:204] [ 1379(16320): 1386(16324)] Signal 1379, PID: 1386, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.091461 711557 task_signals.go:204] [ 1379(16320): 1384(16322)] Signal 1379, PID: 1384, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.091677 711557 task_exit.go:204] [ 1379(16320): 1383(16321)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.091810 711557 task_exit.go:204] [ 1379(16320): 1383(16321)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.092047 711557 task_exit.go:204] [ 1379(16320): 1386(16324)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.092156 711557 task_exit.go:204] [ 1379(16320): 1385(16323)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.092371 711557 task_exit.go:204] [ 1379(16320): 1385(16323)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.092412 711557 task_exit.go:204] [ 1379(16320): 1385(16323)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.092577 711557 task_exit.go:204] [ 1379(16320): 1384(16322)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.092811 711557 task_exit.go:204] [ 1379(16320): 1384(16322)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.092856 711557 task_exit.go:204] [ 1379(16320): 1384(16322)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.093052 711557 task_exit.go:204] [ 1379(16320): 1379(16320)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.102887 711557 task_exit.go:204] [ 1379(16320): 1386(16324)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.102969 711557 task_exit.go:204] [ 1379(16320): 1386(16324)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.103088 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:22.103612 711557 task_exit.go:204] [ 1379(16320): 1379(16320)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:22 executing program 1: pipe(0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) listen(r0, 0x0) r1 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x5452, &(0x7f00000014c0)) accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, &(0x7f00000000c0)=0x1c, 0x0) r2 = accept4$inet6(r0, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r4 = socket$inet6(0xa, 0x3, 0xa2b) bind$inet6(r4, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5452, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) D0706 16:21:22.119889 711557 usertrap_amd64.go:212] [ 1378(16966): 1378(16966)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:22.119968 711557 usertrap_amd64.go:122] [ 1378(16966): 1378(16966)] Allocate a new trap: 0xc0004751d0 44 D0706 16:21:22.120037 711557 usertrap_amd64.go:225] [ 1378(16966): 1378(16966)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:22.158316 711557 usertrap_amd64.go:212] [ 1389(16325): 1389(16325)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:22.158417 711557 usertrap_amd64.go:122] [ 1389(16325): 1389(16325)] Allocate a new trap: 0xc000049ec0 40 D0706 16:21:22.159389 711557 usertrap_amd64.go:225] [ 1389(16325): 1389(16325)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:22.166733 711557 usertrap_amd64.go:212] [ 1389(16325): 1389(16325)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:22.166833 711557 usertrap_amd64.go:122] [ 1389(16325): 1389(16325)] Allocate a new trap: 0xc000049ec0 41 D0706 16:21:22.167023 711557 usertrap_amd64.go:225] [ 1389(16325): 1389(16325)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:22.196628 711557 usertrap_amd64.go:212] [ 1365(15730): 1365(15730)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:22.196757 711557 usertrap_amd64.go:122] [ 1365(15730): 1365(15730)] Allocate a new trap: 0xc000049e90 45 D0706 16:21:22.196850 711557 usertrap_amd64.go:225] [ 1365(15730): 1365(15730)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:22.200182 711557 task_exit.go:204] [ 1365(15730): 1365(15730)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.200385 711557 task_signals.go:204] [ 1365(15730): 1368(15731)] Signal 1365, PID: 1368, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.200515 711557 task_signals.go:204] [ 1365(15730): 1371(15732)] Signal 1365, PID: 1371, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.200634 711557 task_exit.go:204] [ 1365(15730): 1368(15731)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.200832 711557 task_exit.go:204] [ 1365(15730): 1365(15730)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.201400 711557 task_exit.go:204] [ 1365(15730): 1368(15731)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.201468 711557 task_exit.go:204] [ 1365(15730): 1368(15731)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.201742 711557 task_exit.go:204] [ 1365(15730): 1371(15732)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.210485 711557 task_exit.go:204] [ 1365(15730): 1371(15732)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.210584 711557 task_exit.go:204] [ 1365(15730): 1371(15732)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.210683 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 16:21:22 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:22.211032 711557 task_exit.go:204] [ 1365(15730): 1365(15730)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.253243 711557 usertrap_amd64.go:212] [ 1380(17793): 1380(17793)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:22.253350 711557 usertrap_amd64.go:122] [ 1380(17793): 1380(17793)] Allocate a new trap: 0xc000475200 43 D0706 16:21:22.253430 711557 usertrap_amd64.go:225] [ 1380(17793): 1380(17793)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:22.518000 711557 usertrap_amd64.go:212] [ 1380(17793): 1380(17793)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:22.518090 711557 usertrap_amd64.go:122] [ 1380(17793): 1380(17793)] Allocate a new trap: 0xc000475200 44 D0706 16:21:22.518187 711557 usertrap_amd64.go:225] [ 1380(17793): 1380(17793)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:22.526320 711557 task_exit.go:204] [ 1380(17793): 1380(17793)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.526554 711557 task_exit.go:204] [ 1380(17793): 1380(17793)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.526763 711557 task_signals.go:204] [ 1380(17793): 1382(17794)] Signal 1380, PID: 1382, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.526861 711557 task_exit.go:204] [ 1380(17793): 1382(17794)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.527082 711557 task_exit.go:204] [ 1380(17793): 1382(17794)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.527133 711557 task_exit.go:204] [ 1380(17793): 1382(17794)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.527454 711557 task_signals.go:204] [ 1380(17793): 1390(17796)] Signal 1380, PID: 1390, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527453 711557 task_signals.go:204] [ 1380(17793): 1388(17795)] Signal 1380, PID: 1388, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527467 711557 task_signals.go:204] [ 1380(17793): 1395(17801)] Signal 1380, PID: 1395, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527550 711557 task_signals.go:204] [ 1380(17793): 1394(17800)] Signal 1380, PID: 1394, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527537 711557 task_signals.go:204] [ 1380(17793): 1393(17799)] Signal 1380, PID: 1393, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527668 711557 task_exit.go:204] [ 1380(17793): 1390(17796)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.527832 711557 task_signals.go:204] [ 1380(17793): 1392(17798)] Signal 1380, PID: 1392, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527926 711557 task_signals.go:204] [ 1380(17793): 1391(17797)] Signal 1380, PID: 1391, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:22.527997 711557 task_exit.go:204] [ 1380(17793): 1390(17796)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.528041 711557 task_exit.go:204] [ 1380(17793): 1390(17796)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.528333 711557 task_exit.go:204] [ 1380(17793): 1388(17795)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.528444 711557 task_exit.go:204] [ 1380(17793): 1391(17797)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.528638 711557 task_exit.go:204] [ 1380(17793): 1391(17797)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.528693 711557 task_exit.go:204] [ 1380(17793): 1391(17797)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.528824 711557 task_exit.go:204] [ 1380(17793): 1395(17801)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.529037 711557 task_exit.go:204] [ 1380(17793): 1395(17801)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.529101 711557 task_exit.go:204] [ 1380(17793): 1395(17801)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.529215 711557 task_exit.go:204] [ 1380(17793): 1394(17800)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.529444 711557 task_exit.go:204] [ 1380(17793): 1394(17800)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.529491 711557 task_exit.go:204] [ 1380(17793): 1394(17800)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.529607 711557 task_exit.go:204] [ 1380(17793): 1393(17799)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.529802 711557 task_exit.go:204] [ 1380(17793): 1393(17799)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.529840 711557 task_exit.go:204] [ 1380(17793): 1393(17799)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.529945 711557 task_exit.go:204] [ 1380(17793): 1392(17798)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:22.530173 711557 task_exit.go:204] [ 1380(17793): 1392(17798)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.530224 711557 task_exit.go:204] [ 1380(17793): 1392(17798)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.541923 711557 task_exit.go:204] [ 1380(17793): 1388(17795)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:22.542017 711557 task_exit.go:204] [ 1380(17793): 1388(17795)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.542110 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:22.542703 711557 task_exit.go:204] [ 1380(17793): 1380(17793)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:22.543661 711557 usertrap_amd64.go:212] [ 1389(16325): 1389(16325)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:22.543831 711557 usertrap_amd64.go:122] [ 1389(16325): 1389(16325)] Allocate a new trap: 0xc000049ec0 42 D0706 16:21:22.543936 711557 usertrap_amd64.go:225] [ 1389(16325): 1389(16325)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) 16:21:22 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x880) write$cgroup_pid(r1, &(0x7f0000000140)=0xffffffffffffffff, 0x12) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bond_slave_1\x00') utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) pipe2(&(0x7f0000000100), 0x880) (async) write$cgroup_pid(r1, &(0x7f0000000140)=0xffffffffffffffff, 0x12) (async) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bond_slave_1\x00') (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) D0706 16:21:22.616429 711557 usertrap_amd64.go:212] [ 1396(15733): 1396(15733)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:22.616591 711557 usertrap_amd64.go:122] [ 1396(15733): 1396(15733)] Allocate a new trap: 0xc008918900 40 D0706 16:21:22.618314 711557 usertrap_amd64.go:225] [ 1396(15733): 1396(15733)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:22.621579 711557 usertrap_amd64.go:212] [ 1396(15733): 1396(15733)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:22.621684 711557 usertrap_amd64.go:122] [ 1396(15733): 1396(15733)] Allocate a new trap: 0xc008918900 41 D0706 16:21:22.621775 711557 usertrap_amd64.go:225] [ 1396(15733): 1396(15733)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:22.635339 711557 usertrap_amd64.go:212] [ 1398(17802): 1398(17802)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:22.635475 711557 usertrap_amd64.go:122] [ 1398(17802): 1398(17802)] Allocate a new trap: 0xc000049ef0 40 D0706 16:21:22.636656 711557 usertrap_amd64.go:225] [ 1398(17802): 1398(17802)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:22.640820 711557 usertrap_amd64.go:212] [ 1396(15733): 1396(15733)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:22.640907 711557 usertrap_amd64.go:122] [ 1396(15733): 1396(15733)] Allocate a new trap: 0xc008918900 42 D0706 16:21:22.640935 711557 usertrap_amd64.go:212] [ 1398(17802): 1398(17802)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:22.641016 711557 usertrap_amd64.go:225] [ 1396(15733): 1396(15733)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:22.641060 711557 usertrap_amd64.go:122] [ 1398(17802): 1398(17802)] Allocate a new trap: 0xc000049ef0 41 D0706 16:21:22.641133 711557 usertrap_amd64.go:225] [ 1398(17802): 1398(17802)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:22.659238 711557 usertrap_amd64.go:212] [ 1396(15733): 1399(15734)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:22.659366 711557 usertrap_amd64.go:122] [ 1396(15733): 1399(15734)] Allocate a new trap: 0xc008918900 43 D0706 16:21:22.659452 711557 usertrap_amd64.go:225] [ 1396(15733): 1399(15734)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:22.661801 711557 usertrap_amd64.go:212] [ 1398(17802): 1398(17802)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:22.661882 711557 usertrap_amd64.go:122] [ 1398(17802): 1398(17802)] Allocate a new trap: 0xc000049ef0 42 D0706 16:21:22.661988 711557 usertrap_amd64.go:225] [ 1398(17802): 1398(17802)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:22.688355 711557 usertrap_amd64.go:212] [ 1389(16325): 1389(16325)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:22.688447 711557 usertrap_amd64.go:122] [ 1389(16325): 1389(16325)] Allocate a new trap: 0xc000049ec0 43 D0706 16:21:22.688572 711557 usertrap_amd64.go:225] [ 1389(16325): 1389(16325)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:23.075143 711557 usertrap_amd64.go:212] [ 1378(16966): 1378(16966)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:23.075293 711557 usertrap_amd64.go:122] [ 1378(16966): 1378(16966)] Allocate a new trap: 0xc0004751d0 45 D0706 16:21:23.075365 711557 usertrap_amd64.go:225] [ 1378(16966): 1378(16966)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:23.080756 711557 task_exit.go:204] [ 1378(16966): 1378(16966)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.081144 711557 task_exit.go:204] [ 1378(16966): 1378(16966)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.081245 711557 task_signals.go:204] [ 1378(16966): 1381(16967)] Signal 1378, PID: 1381, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.081288 711557 task_signals.go:204] [ 1378(16966): 1387(16968)] Signal 1378, PID: 1387, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.081339 711557 task_exit.go:204] [ 1378(16966): 1381(16967)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.082371 711557 task_exit.go:204] [ 1378(16966): 1387(16968)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.082527 711557 task_exit.go:204] [ 1378(16966): 1387(16968)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.082571 711557 task_exit.go:204] [ 1378(16966): 1387(16968)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.084294 711557 task_exit.go:204] [ 1389(16325): 1389(16325)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.084664 711557 task_signals.go:204] [ 1389(16325): 1401(16327)] Signal 1389, PID: 1401, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.084754 711557 task_signals.go:204] [ 1389(16325): 1397(16326)] Signal 1389, PID: 1397, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.084878 711557 task_exit.go:204] [ 1389(16325): 1389(16325)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.085524 711557 task_exit.go:204] [ 1389(16325): 1401(16327)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.085773 711557 task_exit.go:204] [ 1389(16325): 1401(16327)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.085821 711557 task_exit.go:204] [ 1389(16325): 1401(16327)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.085934 711557 usertrap_amd64.go:212] [ 1398(17802): 1398(17802)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:23.086008 711557 usertrap_amd64.go:122] [ 1398(17802): 1398(17802)] Allocate a new trap: 0xc000049ef0 43 D0706 16:21:23.086075 711557 usertrap_amd64.go:225] [ 1398(17802): 1398(17802)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:23.085937 711557 task_exit.go:204] [ 1389(16325): 1397(16326)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.087616 711557 usertrap_amd64.go:212] [ 1398(17802): 1398(17802)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:23.087673 711557 usertrap_amd64.go:122] [ 1398(17802): 1398(17802)] Allocate a new trap: 0xc000049ef0 44 D0706 16:21:23.087769 711557 usertrap_amd64.go:225] [ 1398(17802): 1398(17802)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:23.091539 711557 task_exit.go:204] [ 1378(16966): 1381(16967)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.091605 711557 task_exit.go:204] [ 1378(16966): 1381(16967)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.091741 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:23.092926 711557 task_exit.go:204] [ 1378(16966): 1378(16966)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.094312 711557 task_exit.go:204] [ 1389(16325): 1397(16326)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.094400 711557 task_exit.go:204] [ 1389(16325): 1397(16326)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) r3 = syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f0000001e00)) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:23.094508 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:23.095109 711557 task_exit.go:204] [ 1389(16325): 1389(16325)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 1: pipe(0x0) (async) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) (async) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) (async) listen(r0, 0x0) (async) r1 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x5452, &(0x7f00000014c0)) (async) accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, &(0x7f00000000c0)=0x1c, 0x0) (async) r2 = accept4$inet6(r0, 0x0, 0x0, 0x0) (async) r3 = socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) (async) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) r4 = socket$inet6(0xa, 0x3, 0xa2b) bind$inet6(r4, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) (async) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000440)) (async) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) listen(0xffffffffffffffff, 0x0) (async) creat(0x0, 0x0) (async) ioctl$TIOCSETD(0xffffffffffffffff, 0x5452, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) D0706 16:21:23.098372 711557 task_exit.go:204] [ 1398(17802): 1398(17802)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.098578 711557 task_exit.go:204] [ 1398(17802): 1398(17802)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.098569 711557 task_signals.go:204] [ 1398(17802): 1404(17806)] Signal 1398, PID: 1404, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.098687 711557 task_signals.go:204] [ 1398(17802): 1402(17804)] Signal 1398, PID: 1402, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.098703 711557 task_exit.go:204] [ 1398(17802): 1404(17806)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.098871 711557 task_signals.go:204] [ 1398(17802): 1400(17803)] Signal 1398, PID: 1400, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.098951 711557 task_exit.go:204] [ 1398(17802): 1402(17804)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.099107 711557 task_signals.go:204] [ 1398(17802): 1403(17805)] Signal 1398, PID: 1403, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.099248 711557 task_exit.go:204] [ 1398(17802): 1402(17804)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.099310 711557 task_exit.go:204] [ 1398(17802): 1402(17804)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.099458 711557 task_exit.go:204] [ 1398(17802): 1400(17803)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.099636 711557 task_exit.go:204] [ 1398(17802): 1400(17803)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.099684 711557 task_exit.go:204] [ 1398(17802): 1400(17803)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.099788 711557 task_exit.go:204] [ 1398(17802): 1404(17806)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.099851 711557 task_exit.go:204] [ 1398(17802): 1404(17806)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.099975 711557 task_exit.go:204] [ 1398(17802): 1403(17805)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.109234 711557 task_exit.go:204] [ 1398(17802): 1403(17805)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.109352 711557 task_exit.go:204] [ 1398(17802): 1403(17805)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.109443 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:23.109681 711557 task_exit.go:204] [ 1398(17802): 1398(17802)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0xad) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) r1 = socket$inet_icmp(0x2, 0x2, 0x1) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) fallocate(r1, 0x48, 0x8, 0x894) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:23.113105 711557 usertrap_amd64.go:212] [ 1396(15733): 1396(15733)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:23.113161 711557 usertrap_amd64.go:122] [ 1396(15733): 1396(15733)] Allocate a new trap: 0xc008918900 44 D0706 16:21:23.113230 711557 usertrap_amd64.go:225] [ 1396(15733): 1396(15733)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:23.203497 711557 usertrap_amd64.go:212] [ 1406(16969): 1406(16969)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:23.203647 711557 usertrap_amd64.go:122] [ 1406(16969): 1406(16969)] Allocate a new trap: 0xc00fc59cb0 40 D0706 16:21:23.206339 711557 usertrap_amd64.go:225] [ 1406(16969): 1406(16969)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:23.207186 711557 usertrap_amd64.go:212] [ 1408(17807): 1408(17807)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:23.207377 711557 usertrap_amd64.go:122] [ 1408(17807): 1408(17807)] Allocate a new trap: 0xc000475260 40 D0706 16:21:23.208563 711557 usertrap_amd64.go:225] [ 1408(17807): 1408(17807)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:23.211971 711557 usertrap_amd64.go:212] [ 1406(16969): 1406(16969)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:23.212127 711557 usertrap_amd64.go:122] [ 1406(16969): 1406(16969)] Allocate a new trap: 0xc00fc59cb0 41 D0706 16:21:23.212245 711557 usertrap_amd64.go:225] [ 1406(16969): 1406(16969)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:23.212319 711557 usertrap_amd64.go:212] [ 1408(17807): 1408(17807)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:23.212432 711557 usertrap_amd64.go:122] [ 1408(17807): 1408(17807)] Allocate a new trap: 0xc000475260 41 D0706 16:21:23.212501 711557 usertrap_amd64.go:225] [ 1408(17807): 1408(17807)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:23.215967 711557 usertrap_amd64.go:212] [ 1407(16328): 1407(16328)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:23.216068 711557 usertrap_amd64.go:122] [ 1407(16328): 1407(16328)] Allocate a new trap: 0xc1e57717a0 40 D0706 16:21:23.216931 711557 usertrap_amd64.go:225] [ 1407(16328): 1407(16328)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:23.224291 711557 usertrap_amd64.go:212] [ 1407(16328): 1407(16328)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:23.224386 711557 usertrap_amd64.go:122] [ 1407(16328): 1407(16328)] Allocate a new trap: 0xc1e57717a0 41 D0706 16:21:23.224443 711557 usertrap_amd64.go:225] [ 1407(16328): 1407(16328)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:23.236403 711557 usertrap_amd64.go:212] [ 1406(16969): 1406(16969)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:23.236502 711557 usertrap_amd64.go:122] [ 1406(16969): 1406(16969)] Allocate a new trap: 0xc00fc59cb0 42 D0706 16:21:23.236572 711557 usertrap_amd64.go:225] [ 1406(16969): 1406(16969)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:23.239115 711557 usertrap_amd64.go:212] [ 1408(17807): 1408(17807)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:23.239278 711557 usertrap_amd64.go:122] [ 1408(17807): 1408(17807)] Allocate a new trap: 0xc000475260 42 D0706 16:21:23.239366 711557 usertrap_amd64.go:225] [ 1408(17807): 1408(17807)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:23.246787 711557 usertrap_amd64.go:212] [ 1406(16969): 1409(16970)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:23.246868 711557 usertrap_amd64.go:122] [ 1406(16969): 1409(16970)] Allocate a new trap: 0xc00fc59cb0 43 D0706 16:21:23.246947 711557 usertrap_amd64.go:225] [ 1406(16969): 1409(16970)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:23.249487 711557 usertrap_amd64.go:212] [ 1407(16328): 1407(16328)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:23.249718 711557 usertrap_amd64.go:122] [ 1407(16328): 1407(16328)] Allocate a new trap: 0xc1e57717a0 42 D0706 16:21:23.249894 711557 usertrap_amd64.go:225] [ 1407(16328): 1407(16328)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:23.250661 711557 usertrap_amd64.go:212] [ 1408(17807): 1410(17808)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:23.250723 711557 usertrap_amd64.go:122] [ 1408(17807): 1410(17808)] Allocate a new trap: 0xc000475260 43 D0706 16:21:23.250798 711557 usertrap_amd64.go:225] [ 1408(17807): 1410(17808)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:23.264174 711557 usertrap_amd64.go:212] [ 1408(17807): 1408(17807)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:23.264261 711557 usertrap_amd64.go:122] [ 1408(17807): 1408(17807)] Allocate a new trap: 0xc000475260 44 D0706 16:21:23.264331 711557 usertrap_amd64.go:225] [ 1408(17807): 1408(17807)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:23.266923 711557 task_exit.go:204] [ 1408(17807): 1408(17807)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.267295 711557 task_signals.go:204] [ 1408(17807): 1410(17808)] Signal 1408, PID: 1410, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.267432 711557 task_exit.go:204] [ 1408(17807): 1408(17807)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.267552 711557 task_exit.go:204] [ 1408(17807): 1410(17808)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.276356 711557 task_exit.go:204] [ 1408(17807): 1410(17808)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.276435 711557 task_exit.go:204] [ 1408(17807): 1410(17808)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.276550 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:23.278072 711557 task_exit.go:204] [ 1408(17807): 1408(17807)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0xad) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (async) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) (async) fallocate(r1, 0x48, 0x8, 0x894) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:23.285451 711557 usertrap_amd64.go:212] [ 1407(16328): 1407(16328)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:23.285532 711557 usertrap_amd64.go:122] [ 1407(16328): 1407(16328)] Allocate a new trap: 0xc1e57717a0 43 D0706 16:21:23.285604 711557 usertrap_amd64.go:225] [ 1407(16328): 1407(16328)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:23.295069 711557 task_exit.go:204] [ 1407(16328): 1407(16328)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.295300 711557 task_signals.go:204] [ 1407(16328): 1411(16329)] Signal 1407, PID: 1411, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.295355 711557 task_signals.go:204] [ 1407(16328): 1414(16332)] Signal 1407, PID: 1414, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.295468 711557 task_signals.go:204] [ 1407(16328): 1412(16330)] Signal 1407, PID: 1412, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.295502 711557 task_signals.go:204] [ 1407(16328): 1415(16333)] Signal 1407, PID: 1415, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.295624 711557 task_signals.go:204] [ 1407(16328): 1416(16334)] Signal 1407, PID: 1416, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.295664 711557 task_signals.go:204] [ 1407(16328): 1413(16331)] Signal 1407, PID: 1413, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.295762 711557 task_exit.go:204] [ 1407(16328): 1413(16331)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.296092 711557 task_exit.go:204] [ 1407(16328): 1413(16331)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.296145 711557 task_exit.go:204] [ 1407(16328): 1413(16331)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.296262 711557 task_exit.go:204] [ 1407(16328): 1412(16330)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.296473 711557 task_exit.go:204] [ 1407(16328): 1412(16330)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.296529 711557 task_exit.go:204] [ 1407(16328): 1412(16330)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.296778 711557 task_exit.go:204] [ 1407(16328): 1411(16329)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.296883 711557 task_exit.go:204] [ 1407(16328): 1414(16332)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.297381 711557 task_exit.go:204] [ 1407(16328): 1407(16328)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.297555 711557 task_exit.go:204] [ 1407(16328): 1416(16334)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.297725 711557 task_exit.go:204] [ 1407(16328): 1415(16333)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.298147 711557 task_exit.go:204] [ 1407(16328): 1411(16329)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.298255 711557 task_exit.go:204] [ 1407(16328): 1411(16329)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.298477 711557 task_exit.go:204] [ 1407(16328): 1415(16333)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.298549 711557 task_exit.go:204] [ 1407(16328): 1415(16333)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.298690 711557 task_exit.go:204] [ 1407(16328): 1414(16332)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.298781 711557 task_exit.go:204] [ 1407(16328): 1414(16332)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.307366 711557 task_exit.go:204] [ 1407(16328): 1416(16334)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.307427 711557 task_exit.go:204] [ 1407(16328): 1416(16334)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.307508 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:23.308341 711557 task_exit.go:204] [ 1407(16328): 1407(16328)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 1: pipe(0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) (async) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) (async) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) listen(r0, 0x0) (async) listen(r0, 0x0) r1 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x5452, &(0x7f00000014c0)) accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @local}}, &(0x7f00000000c0)=0x1c, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) (async) r2 = accept4$inet6(r0, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) (async) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r4 = socket$inet6(0xa, 0x3, 0xa2b) bind$inet6(r4, 0x0, 0x0) (async) bind$inet6(r4, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5452, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) D0706 16:21:23.314209 711557 usertrap_amd64.go:212] [ 1406(16969): 1406(16969)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:23.314438 711557 usertrap_amd64.go:122] [ 1406(16969): 1406(16969)] Allocate a new trap: 0xc00fc59cb0 44 D0706 16:21:23.314513 711557 usertrap_amd64.go:225] [ 1406(16969): 1406(16969)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:23.318251 711557 usertrap_amd64.go:212] [ 1417(17809): 1417(17809)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:23.318343 711557 usertrap_amd64.go:122] [ 1417(17809): 1417(17809)] Allocate a new trap: 0xc173598ed0 40 D0706 16:21:23.319333 711557 usertrap_amd64.go:225] [ 1417(17809): 1417(17809)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:23.323166 711557 usertrap_amd64.go:212] [ 1417(17809): 1417(17809)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:23.323245 711557 usertrap_amd64.go:122] [ 1417(17809): 1417(17809)] Allocate a new trap: 0xc173598ed0 41 D0706 16:21:23.323308 711557 usertrap_amd64.go:225] [ 1417(17809): 1417(17809)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:23.340392 711557 usertrap_amd64.go:212] [ 1417(17809): 1417(17809)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:23.340457 711557 usertrap_amd64.go:122] [ 1417(17809): 1417(17809)] Allocate a new trap: 0xc173598ed0 42 D0706 16:21:23.340545 711557 usertrap_amd64.go:225] [ 1417(17809): 1417(17809)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:23.347039 711557 usertrap_amd64.go:212] [ 1417(17809): 1420(17810)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:23.347119 711557 usertrap_amd64.go:122] [ 1417(17809): 1420(17810)] Allocate a new trap: 0xc173598ed0 43 D0706 16:21:23.347200 711557 usertrap_amd64.go:225] [ 1417(17809): 1420(17810)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:23.349696 711557 usertrap_amd64.go:212] [ 1419(16335): 1419(16335)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:23.349790 711557 usertrap_amd64.go:122] [ 1419(16335): 1419(16335)] Allocate a new trap: 0xc0209f0fc0 40 D0706 16:21:23.350546 711557 usertrap_amd64.go:225] [ 1419(16335): 1419(16335)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:23.354235 711557 usertrap_amd64.go:212] [ 1417(17809): 1417(17809)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:23.354286 711557 usertrap_amd64.go:122] [ 1417(17809): 1417(17809)] Allocate a new trap: 0xc173598ed0 44 D0706 16:21:23.354357 711557 usertrap_amd64.go:225] [ 1417(17809): 1417(17809)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:23.355898 711557 task_exit.go:204] [ 1417(17809): 1417(17809)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.355992 711557 task_signals.go:204] [ 1417(17809): 1421(17811)] Signal 1417, PID: 1421, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.356032 711557 task_signals.go:204] [ 1417(17809): 1420(17810)] Signal 1417, PID: 1420, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.356072 711557 task_exit.go:204] [ 1417(17809): 1421(17811)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.356471 711557 task_exit.go:204] [ 1417(17809): 1417(17809)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.356585 711557 task_exit.go:204] [ 1417(17809): 1420(17810)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.356836 711557 task_exit.go:204] [ 1417(17809): 1420(17810)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.356930 711557 task_exit.go:204] [ 1417(17809): 1420(17810)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.357757 711557 usertrap_amd64.go:212] [ 1419(16335): 1419(16335)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:23.357814 711557 usertrap_amd64.go:122] [ 1419(16335): 1419(16335)] Allocate a new trap: 0xc0209f0fc0 41 D0706 16:21:23.357866 711557 usertrap_amd64.go:225] [ 1419(16335): 1419(16335)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:23.364312 711557 task_exit.go:204] [ 1417(17809): 1421(17811)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.364387 711557 task_exit.go:204] [ 1417(17809): 1421(17811)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.364455 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:23.364709 711557 task_exit.go:204] [ 1417(17809): 1417(17809)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0xad) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (async) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) (async) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) (async) fallocate(r1, 0x48, 0x8, 0x894) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:23.385201 711557 usertrap_amd64.go:212] [ 1419(16335): 1419(16335)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:23.385284 711557 usertrap_amd64.go:122] [ 1419(16335): 1419(16335)] Allocate a new trap: 0xc0209f0fc0 42 D0706 16:21:23.385350 711557 usertrap_amd64.go:225] [ 1419(16335): 1419(16335)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:23.398181 711557 usertrap_amd64.go:212] [ 1422(17812): 1422(17812)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:23.398274 711557 usertrap_amd64.go:122] [ 1422(17812): 1422(17812)] Allocate a new trap: 0xc173598f30 40 D0706 16:21:23.399137 711557 usertrap_amd64.go:225] [ 1422(17812): 1422(17812)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:23.402254 711557 usertrap_amd64.go:212] [ 1422(17812): 1422(17812)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:23.402360 711557 usertrap_amd64.go:122] [ 1422(17812): 1422(17812)] Allocate a new trap: 0xc173598f30 41 D0706 16:21:23.402442 711557 usertrap_amd64.go:225] [ 1422(17812): 1422(17812)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:23.416850 711557 usertrap_amd64.go:212] [ 1422(17812): 1422(17812)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:23.417020 711557 usertrap_amd64.go:122] [ 1422(17812): 1422(17812)] Allocate a new trap: 0xc173598f30 42 D0706 16:21:23.417146 711557 usertrap_amd64.go:225] [ 1422(17812): 1422(17812)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:23.424552 711557 usertrap_amd64.go:212] [ 1422(17812): 1425(17813)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:23.424615 711557 usertrap_amd64.go:122] [ 1422(17812): 1425(17813)] Allocate a new trap: 0xc173598f30 43 D0706 16:21:23.424695 711557 usertrap_amd64.go:225] [ 1422(17812): 1425(17813)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:23.430589 711557 usertrap_amd64.go:212] [ 1422(17812): 1422(17812)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:23.430648 711557 usertrap_amd64.go:122] [ 1422(17812): 1422(17812)] Allocate a new trap: 0xc173598f30 44 D0706 16:21:23.430717 711557 usertrap_amd64.go:225] [ 1422(17812): 1422(17812)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:23.432289 711557 task_exit.go:204] [ 1422(17812): 1422(17812)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.432529 711557 task_signals.go:204] [ 1422(17812): 1426(17814)] Signal 1422, PID: 1426, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.432576 711557 task_signals.go:204] [ 1422(17812): 1425(17813)] Signal 1422, PID: 1425, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.432562 711557 task_signals.go:204] [ 1422(17812): 1427(17815)] Signal 1422, PID: 1427, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.432663 711557 task_exit.go:204] [ 1422(17812): 1426(17814)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.432767 711557 task_exit.go:204] [ 1422(17812): 1425(17813)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.433012 711557 task_exit.go:204] [ 1422(17812): 1425(17813)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.433075 711557 task_exit.go:204] [ 1422(17812): 1425(17813)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.433212 711557 task_exit.go:204] [ 1422(17812): 1427(17815)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.433466 711557 task_exit.go:204] [ 1422(17812): 1427(17815)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.433518 711557 task_exit.go:204] [ 1422(17812): 1427(17815)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.433921 711557 task_exit.go:204] [ 1422(17812): 1422(17812)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.440824 711557 task_exit.go:204] [ 1422(17812): 1426(17814)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.440914 711557 task_exit.go:204] [ 1422(17812): 1426(17814)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.441027 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:23.441782 711557 task_exit.go:204] [ 1422(17812): 1422(17812)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.458484 711557 usertrap_amd64.go:212] [ 1419(16335): 1419(16335)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:23.458540 711557 usertrap_amd64.go:122] [ 1419(16335): 1419(16335)] Allocate a new trap: 0xc0209f0fc0 43 D0706 16:21:23.458596 711557 usertrap_amd64.go:225] [ 1419(16335): 1419(16335)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:23.467410 711557 usertrap_amd64.go:212] [ 1396(15733): 1396(15733)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:23.467478 711557 usertrap_amd64.go:122] [ 1396(15733): 1396(15733)] Allocate a new trap: 0xc008918900 45 D0706 16:21:23.467593 711557 usertrap_amd64.go:225] [ 1396(15733): 1396(15733)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:23.469575 711557 task_exit.go:204] [ 1396(15733): 1396(15733)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.469753 711557 task_signals.go:204] [ 1396(15733): 1405(15735)] Signal 1396, PID: 1405, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.469717 711557 task_signals.go:204] [ 1396(15733): 1399(15734)] Signal 1396, PID: 1399, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:23.469819 711557 task_exit.go:204] [ 1396(15733): 1396(15733)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.469905 711557 task_exit.go:204] [ 1396(15733): 1405(15735)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.470060 711557 task_exit.go:204] [ 1396(15733): 1405(15735)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.470096 711557 task_exit.go:204] [ 1396(15733): 1405(15735)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.470178 711557 task_exit.go:204] [ 1396(15733): 1399(15734)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:23.477659 711557 task_exit.go:204] [ 1396(15733): 1399(15734)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:23.477728 711557 task_exit.go:204] [ 1396(15733): 1399(15734)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:23.477823 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:23.478258 711557 task_exit.go:204] [ 1396(15733): 1396(15733)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:23 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:23 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) getrlimit(0x3, &(0x7f00000000c0)) D0706 16:21:23.500625 711557 usertrap_amd64.go:212] [ 1430(17816): 1430(17816)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:23.500701 711557 usertrap_amd64.go:122] [ 1430(17816): 1430(17816)] Allocate a new trap: 0xc008510450 40 D0706 16:21:23.501534 711557 usertrap_amd64.go:225] [ 1430(17816): 1430(17816)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:23.504801 711557 usertrap_amd64.go:212] [ 1430(17816): 1430(17816)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:23.504871 711557 usertrap_amd64.go:122] [ 1430(17816): 1430(17816)] Allocate a new trap: 0xc008510450 41 D0706 16:21:23.504935 711557 usertrap_amd64.go:225] [ 1430(17816): 1430(17816)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:23.506847 711557 usertrap_amd64.go:212] [ 1431(15736): 1431(15736)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:23.506983 711557 usertrap_amd64.go:122] [ 1431(15736): 1431(15736)] Allocate a new trap: 0xc173598ff0 40 D0706 16:21:23.507882 711557 usertrap_amd64.go:225] [ 1431(15736): 1431(15736)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:23.511956 711557 usertrap_amd64.go:212] [ 1431(15736): 1431(15736)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:23.512014 711557 usertrap_amd64.go:122] [ 1431(15736): 1431(15736)] Allocate a new trap: 0xc173598ff0 41 D0706 16:21:23.512089 711557 usertrap_amd64.go:225] [ 1431(15736): 1431(15736)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:23.529683 711557 usertrap_amd64.go:212] [ 1431(15736): 1431(15736)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:23.529773 711557 usertrap_amd64.go:122] [ 1431(15736): 1431(15736)] Allocate a new trap: 0xc173598ff0 42 D0706 16:21:23.529824 711557 usertrap_amd64.go:225] [ 1431(15736): 1431(15736)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:23.536382 711557 usertrap_amd64.go:212] [ 1430(17816): 1430(17816)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:23.536480 711557 usertrap_amd64.go:122] [ 1430(17816): 1430(17816)] Allocate a new trap: 0xc008510450 42 D0706 16:21:23.536531 711557 usertrap_amd64.go:225] [ 1430(17816): 1430(17816)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:23.556908 711557 usertrap_amd64.go:212] [ 1431(15736): 1432(15737)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:23.557054 711557 usertrap_amd64.go:122] [ 1431(15736): 1432(15737)] Allocate a new trap: 0xc173598ff0 43 D0706 16:21:23.557192 711557 usertrap_amd64.go:225] [ 1431(15736): 1432(15737)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:23.629137 711557 usertrap_amd64.go:212] [ 1431(15736): 1431(15736)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:23.629221 711557 usertrap_amd64.go:122] [ 1431(15736): 1431(15736)] Allocate a new trap: 0xc173598ff0 44 D0706 16:21:23.629280 711557 usertrap_amd64.go:225] [ 1431(15736): 1431(15736)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:23.650226 711557 usertrap_amd64.go:212] [ 1430(17816): 1430(17816)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:23.650281 711557 usertrap_amd64.go:122] [ 1430(17816): 1430(17816)] Allocate a new trap: 0xc008510450 43 D0706 16:21:23.650372 711557 usertrap_amd64.go:225] [ 1430(17816): 1430(17816)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:24.050655 711557 usertrap_amd64.go:212] [ 1430(17816): 1430(17816)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:24.050785 711557 usertrap_amd64.go:122] [ 1430(17816): 1430(17816)] Allocate a new trap: 0xc008510450 44 D0706 16:21:24.050866 711557 usertrap_amd64.go:225] [ 1430(17816): 1430(17816)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:24.058243 711557 usertrap_amd64.go:212] [ 1406(16969): 1406(16969)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:24.058303 711557 usertrap_amd64.go:122] [ 1406(16969): 1406(16969)] Allocate a new trap: 0xc00fc59cb0 45 D0706 16:21:24.058409 711557 usertrap_amd64.go:225] [ 1406(16969): 1406(16969)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:24.058763 711557 task_exit.go:204] [ 1430(17816): 1430(17816)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.059101 711557 task_exit.go:204] [ 1430(17816): 1430(17816)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.059109 711557 task_signals.go:204] [ 1430(17816): 1433(17817)] Signal 1430, PID: 1433, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.059211 711557 task_signals.go:204] [ 1430(17816): 1436(17819)] Signal 1430, PID: 1436, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.059306 711557 task_exit.go:204] [ 1430(17816): 1433(17817)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.059512 711557 task_signals.go:204] [ 1430(17816): 1434(17818)] Signal 1430, PID: 1434, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.059548 711557 task_exit.go:204] [ 1430(17816): 1436(17819)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.059801 711557 task_exit.go:204] [ 1430(17816): 1434(17818)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.060034 711557 task_exit.go:204] [ 1430(17816): 1436(17819)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.060141 711557 task_exit.go:204] [ 1430(17816): 1436(17819)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.060403 711557 task_exit.go:204] [ 1430(17816): 1433(17817)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.060468 711557 task_exit.go:204] [ 1430(17816): 1433(17817)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.062258 711557 task_exit.go:204] [ 1406(16969): 1406(16969)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.062541 711557 task_signals.go:204] [ 1406(16969): 1418(16971)] Signal 1406, PID: 1418, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.062581 711557 task_signals.go:204] [ 1406(16969): 1409(16970)] Signal 1406, PID: 1409, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.062772 711557 task_exit.go:204] [ 1406(16969): 1406(16969)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.062955 711557 task_exit.go:204] [ 1406(16969): 1409(16970)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.063209 711557 task_exit.go:204] [ 1406(16969): 1418(16971)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.064103 711557 task_exit.go:204] [ 1406(16969): 1409(16970)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.064205 711557 task_exit.go:204] [ 1406(16969): 1409(16970)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.068238 711557 task_exit.go:204] [ 1430(17816): 1434(17818)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.068383 711557 task_exit.go:204] [ 1430(17816): 1434(17818)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.068487 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:24.069094 711557 task_exit.go:204] [ 1430(17816): 1430(17816)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.079489 711557 task_exit.go:204] [ 1406(16969): 1418(16971)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.079552 711557 task_exit.go:204] [ 1406(16969): 1418(16971)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.079623 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:24.080230 711557 task_exit.go:204] [ 1406(16969): 1406(16969)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:24 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) r3 = syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f0000001e00)) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:24 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async, rerun: 32) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async, rerun: 32) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async, rerun: 64) getrlimit(0x3, &(0x7f00000000c0)) (rerun: 64) D0706 16:21:24.186587 711557 usertrap_amd64.go:212] [ 1438(16972): 1438(16972)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:24.186720 711557 usertrap_amd64.go:122] [ 1438(16972): 1438(16972)] Allocate a new trap: 0xc00b3fa060 40 D0706 16:21:24.187542 711557 usertrap_amd64.go:225] [ 1438(16972): 1438(16972)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:24.191746 711557 usertrap_amd64.go:212] [ 1437(17820): 1437(17820)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:24.191850 711557 usertrap_amd64.go:122] [ 1437(17820): 1437(17820)] Allocate a new trap: 0xc0004752f0 40 D0706 16:21:24.192982 711557 usertrap_amd64.go:212] [ 1438(16972): 1438(16972)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:24.193056 711557 usertrap_amd64.go:122] [ 1438(16972): 1438(16972)] Allocate a new trap: 0xc00b3fa060 41 D0706 16:21:24.193140 711557 usertrap_amd64.go:225] [ 1438(16972): 1438(16972)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:24.193159 711557 usertrap_amd64.go:225] [ 1437(17820): 1437(17820)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:24.198768 711557 usertrap_amd64.go:212] [ 1419(16335): 1419(16335)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:24.198863 711557 usertrap_amd64.go:122] [ 1419(16335): 1419(16335)] Allocate a new trap: 0xc0209f0fc0 44 D0706 16:21:24.198949 711557 usertrap_amd64.go:225] [ 1419(16335): 1419(16335)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:24.199736 711557 usertrap_amd64.go:212] [ 1437(17820): 1437(17820)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:24.199890 711557 usertrap_amd64.go:122] [ 1437(17820): 1437(17820)] Allocate a new trap: 0xc0004752f0 41 D0706 16:21:24.199976 711557 usertrap_amd64.go:225] [ 1437(17820): 1437(17820)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:24.209326 711557 task_exit.go:204] [ 1419(16335): 1419(16335)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.209715 711557 task_signals.go:204] [ 1419(16335): 1429(16339)] Signal 1419, PID: 1429, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.209737 711557 task_signals.go:204] [ 1419(16335): 1423(16336)] Signal 1419, PID: 1423, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.209848 711557 task_exit.go:204] [ 1419(16335): 1419(16335)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.209999 711557 task_signals.go:204] [ 1419(16335): 1428(16338)] Signal 1419, PID: 1428, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.210090 711557 task_exit.go:204] [ 1419(16335): 1428(16338)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.210208 711557 task_signals.go:204] [ 1419(16335): 1424(16337)] Signal 1419, PID: 1424, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.210373 711557 task_exit.go:204] [ 1419(16335): 1428(16338)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.210437 711557 task_exit.go:204] [ 1419(16335): 1428(16338)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.210563 711557 task_exit.go:204] [ 1419(16335): 1429(16339)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.211036 711557 task_exit.go:204] [ 1419(16335): 1424(16337)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.211284 711557 task_exit.go:204] [ 1419(16335): 1424(16337)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.211335 711557 task_exit.go:204] [ 1419(16335): 1424(16337)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.211456 711557 task_exit.go:204] [ 1419(16335): 1423(16336)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.211928 711557 task_exit.go:204] [ 1419(16335): 1429(16339)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.212004 711557 task_exit.go:204] [ 1419(16335): 1429(16339)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.220054 711557 usertrap_amd64.go:212] [ 1438(16972): 1438(16972)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:24.220131 711557 usertrap_amd64.go:122] [ 1438(16972): 1438(16972)] Allocate a new trap: 0xc00b3fa060 42 D0706 16:21:24.220197 711557 usertrap_amd64.go:225] [ 1438(16972): 1438(16972)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:24.220391 711557 usertrap_amd64.go:212] [ 1437(17820): 1437(17820)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:24.220465 711557 usertrap_amd64.go:122] [ 1437(17820): 1437(17820)] Allocate a new trap: 0xc0004752f0 42 D0706 16:21:24.220548 711557 usertrap_amd64.go:225] [ 1437(17820): 1437(17820)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:24.220900 711557 task_exit.go:204] [ 1419(16335): 1423(16336)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.221115 711557 task_exit.go:204] [ 1419(16335): 1423(16336)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.221259 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:24.221618 711557 task_exit.go:204] [ 1419(16335): 1419(16335)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:24 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmod(r0, 0x88) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000040)) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f00000000c0)={{r1}, 0x3, &(0x7f0000000080)=[0x7fffffffffffffff, 0x5, 0xe44], 0x0, 0x2}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs2/custom1\x00', 0x2, 0x0) splice(r2, &(0x7f0000000200)=0x80, r0, &(0x7f0000000240)=0xffffffffffffff15, 0x6cc, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x4, 0xffffffe1, 0x0, 0x80, 0xd7}, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x480002, 0x0) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/binder-control\x00', 0x800, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, &(0x7f0000000380)={0xb3b, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = fcntl$dupfd(r3, 0x0, r1) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)="674af01e06dc0eb691152ddbedcb38f3fa5c2aaabc37c43b49757d4122d726bbc164beaa037f2addbc2026b886f786ececafcd76fc61a6161a1af8e575f0976223ebdaf0ee91944061fc54997e3ebcbe5c8f9719520d1aa284a69e4c5d53238d350f470ab34a70ffd7b7db2ed64d9bd55a93cfea13a97f2715846fd179300feccf32b75f4f23b7", 0x87, 0x7fffffffffffffff) fcntl$setflags(r2, 0x2, 0x1) r6 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r6, 0xc038943b, &(0x7f00000004c0)={0x3ff, 0x38, '\x00', 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) fcntl$setownex(r4, 0xf, &(0x7f0000000500)={0x2}) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000c40)={0x128, 0x0, &(0x7f0000000a40)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000540)={@flat=@binder={0x73622a85, 0xb}, @fda={0x66646185, 0x4, 0x0, 0x27}, @fda={0x66646185, 0x7, 0x2, 0x2b}}, &(0x7f00000005c0)={0x0, 0x18, 0x38}}}, @increfs_done={0x40106308, 0x2}, @increfs, @decrefs={0x40046307, 0x2}, @clear_death={0x400c630f, 0x3}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000740)={@ptr={0x70742a85, 0x1, &(0x7f0000000600)=""/18, 0x12, 0x1, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000000640)=""/220, 0xdc, 0x1, 0x3}, @fd={0x66642a85, 0x0, r0}}, &(0x7f00000007c0)={0x0, 0x28, 0x50}}}, @increfs={0x40046304, 0x1}, @acquire={0x40046305, 0x1}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x18, &(0x7f0000000980)={@ptr={0x70742a85, 0x0, &(0x7f0000000800)=""/73, 0x49, 0x2, 0xe}, @ptr={0x70742a85, 0x0, &(0x7f0000000880)=""/119, 0x77, 0x1, 0x3b}, @ptr={0x70742a85, 0x0, &(0x7f0000000900)=""/120, 0x78, 0x1, 0x9}}, &(0x7f0000000a00)={0x0, 0x28, 0x50}}}, @clear_death={0x400c630f, 0x3}], 0x89, 0x0, &(0x7f0000000b80)="ad548c6f1e66a7edd765df349d26d1f86a31c6b11ec7524b57d81db7e81921fd1e17856c5abe79f1a6f08dc7053c0ce5cd02ccdef3aa78637a98b33dcc459d3985939f6eda3746434fd8d79ab22d6c044610f65ee93b3f2d1916f374e3774bb4533d4e12037501b7689478f19930f9dba0c495dd64f483aa983f728790e3ad145d3930996720213f0e"}) open(&(0x7f0000000c80)='./file0\x00', 0x40000, 0xc0) r7 = dup2(r2, r4) r8 = socket$inet(0x2, 0xa, 0x3) shutdown(r8, 0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000cc0)=0xffffffffffffffff) r9 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000d00)='./file0\x00', 0x4000900) inotify_rm_watch(r7, r9) r10 = openat$cgroup_devices(r0, &(0x7f0000000d40)='devices.allow\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r10, 0x941c, 0x0) io_submit(0x0, 0x3, &(0x7f0000002fc0)=[&(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x8, r6, &(0x7f0000000d80)="c9ed410c4b189d50762c7bb1b765bbc59d4894c82505545f5854e1dfb2a20455947f150b18e8d490f3c46e9bc5ce527d7ff9bc111aa5c06c2b92bf1b2363c2f4216b9528b2962d834cc27cc73f170f020b749b2aebbe0812414ffa5d6f028e270f59150774b76801ae4369ed1527766784bd403d07d88f065412a42918a0a87cbbcf8b967b2749c31da61496adc460c4b0b368b708f719b548712a20d91629ce3a12840481e3d1798fef168b45f9bdf4dfa89dcfda", 0xb5, 0xffffffff, 0x0, 0x2}, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x3, 0x4, r5, &(0x7f0000000ec0)="9fe85a47031738a368fc", 0xa, 0x6, 0x0, 0x1, r3}, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x3, 0x12a2, r1, &(0x7f0000000f40)="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", 0x1000, 0x7, 0x0, 0x2}]) D0706 16:21:24.239325 711557 usertrap_amd64.go:212] [ 1438(16972): 1439(16973)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:24.239407 711557 usertrap_amd64.go:122] [ 1438(16972): 1439(16973)] Allocate a new trap: 0xc00b3fa060 43 D0706 16:21:24.239500 711557 usertrap_amd64.go:225] [ 1438(16972): 1439(16973)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:24.241673 711557 usertrap_amd64.go:212] [ 1437(17820): 1437(17820)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:24.241755 711557 usertrap_amd64.go:122] [ 1437(17820): 1437(17820)] Allocate a new trap: 0xc0004752f0 43 D0706 16:21:24.241833 711557 usertrap_amd64.go:225] [ 1437(17820): 1437(17820)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:24.255926 711557 usertrap_amd64.go:212] [ 1445(16340): 1445(16340)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:24.256007 711557 usertrap_amd64.go:122] [ 1445(16340): 1445(16340)] Allocate a new trap: 0xc00b3fa090 40 D0706 16:21:24.257066 711557 usertrap_amd64.go:225] [ 1445(16340): 1445(16340)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:24.260182 711557 usertrap_amd64.go:212] [ 1445(16340): 1445(16340)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:24.260240 711557 usertrap_amd64.go:122] [ 1445(16340): 1445(16340)] Allocate a new trap: 0xc00b3fa090 41 D0706 16:21:24.260327 711557 usertrap_amd64.go:225] [ 1445(16340): 1445(16340)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:24.355188 711557 usertrap_amd64.go:212] [ 1431(15736): 1431(15736)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:24.355303 711557 usertrap_amd64.go:122] [ 1431(15736): 1431(15736)] Allocate a new trap: 0xc173598ff0 45 D0706 16:21:24.355379 711557 usertrap_amd64.go:225] [ 1431(15736): 1431(15736)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:24.358951 711557 task_exit.go:204] [ 1431(15736): 1431(15736)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.359200 711557 task_signals.go:204] [ 1431(15736): 1432(15737)] Signal 1431, PID: 1432, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.359311 711557 task_signals.go:204] [ 1431(15736): 1435(15738)] Signal 1431, PID: 1435, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.359456 711557 task_exit.go:204] [ 1431(15736): 1435(15738)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.359552 711557 task_exit.go:204] [ 1431(15736): 1431(15736)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.359790 711557 task_exit.go:204] [ 1431(15736): 1435(15738)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.359889 711557 task_exit.go:204] [ 1431(15736): 1435(15738)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.360019 711557 task_exit.go:204] [ 1431(15736): 1432(15737)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.368133 711557 task_exit.go:204] [ 1431(15736): 1432(15737)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.368330 711557 task_exit.go:204] [ 1431(15736): 1432(15737)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.368444 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:24.368729 711557 task_exit.go:204] [ 1431(15736): 1431(15736)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:24 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:24.515656 711557 usertrap_amd64.go:212] [ 1438(16972): 1438(16972)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:24.515762 711557 usertrap_amd64.go:122] [ 1438(16972): 1438(16972)] Allocate a new trap: 0xc00b3fa060 44 D0706 16:21:24.515888 711557 usertrap_amd64.go:225] [ 1438(16972): 1438(16972)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:24.681408 711557 usertrap_amd64.go:212] [ 1437(17820): 1437(17820)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:24.681539 711557 usertrap_amd64.go:122] [ 1437(17820): 1437(17820)] Allocate a new trap: 0xc0004752f0 44 D0706 16:21:24.681653 711557 usertrap_amd64.go:225] [ 1437(17820): 1437(17820)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:24.686198 711557 task_exit.go:204] [ 1437(17820): 1437(17820)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.686353 711557 task_signals.go:204] [ 1437(17820): 1441(17822)] Signal 1437, PID: 1441, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.686368 711557 task_signals.go:204] [ 1437(17820): 1442(17823)] Signal 1437, PID: 1442, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.686455 711557 task_exit.go:204] [ 1437(17820): 1441(17822)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.686588 711557 task_signals.go:204] [ 1437(17820): 1443(17824)] Signal 1437, PID: 1443, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.686612 711557 task_exit.go:204] [ 1437(17820): 1442(17823)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.686990 711557 task_signals.go:204] [ 1437(17820): 1444(17825)] Signal 1437, PID: 1444, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.687253 711557 task_signals.go:204] [ 1437(17820): 1440(17821)] Signal 1437, PID: 1440, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.687330 711557 task_exit.go:204] [ 1437(17820): 1444(17825)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.687557 711557 task_exit.go:204] [ 1437(17820): 1440(17821)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.687743 711557 task_exit.go:204] [ 1437(17820): 1444(17825)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.687845 711557 task_exit.go:204] [ 1437(17820): 1444(17825)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.688085 711557 task_exit.go:204] [ 1437(17820): 1442(17823)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.688135 711557 task_exit.go:204] [ 1437(17820): 1442(17823)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.688324 711557 task_exit.go:204] [ 1437(17820): 1443(17824)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.688454 711557 task_exit.go:204] [ 1437(17820): 1441(17822)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.688522 711557 task_exit.go:204] [ 1437(17820): 1441(17822)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.688930 711557 task_exit.go:204] [ 1437(17820): 1440(17821)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.689100 711557 task_exit.go:204] [ 1437(17820): 1440(17821)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.689542 711557 task_exit.go:204] [ 1437(17820): 1443(17824)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.689602 711557 task_exit.go:204] [ 1437(17820): 1443(17824)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.699009 711557 task_exit.go:204] [ 1437(17820): 1437(17820)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.699147 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:24.699871 711557 task_exit.go:204] [ 1437(17820): 1437(17820)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:24 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) getrlimit(0x3, &(0x7f00000000c0)) D0706 16:21:24.709256 711557 usertrap_amd64.go:212] [ 1445(16340): 1445(16340)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:24.709338 711557 usertrap_amd64.go:122] [ 1445(16340): 1445(16340)] Allocate a new trap: 0xc00b3fa090 42 D0706 16:21:24.709425 711557 usertrap_amd64.go:225] [ 1445(16340): 1445(16340)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:24.769898 711557 usertrap_amd64.go:212] [ 1450(15739): 1450(15739)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:24.770007 711557 usertrap_amd64.go:122] [ 1450(15739): 1450(15739)] Allocate a new trap: 0xc1e57717d0 40 D0706 16:21:24.770960 711557 usertrap_amd64.go:225] [ 1450(15739): 1450(15739)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:24.775544 711557 usertrap_amd64.go:212] [ 1450(15739): 1450(15739)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:24.775656 711557 usertrap_amd64.go:122] [ 1450(15739): 1450(15739)] Allocate a new trap: 0xc1e57717d0 41 D0706 16:21:24.775721 711557 usertrap_amd64.go:225] [ 1450(15739): 1450(15739)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:24.793680 711557 usertrap_amd64.go:212] [ 1445(16340): 1445(16340)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:24.793716 711557 usertrap_amd64.go:212] [ 1452(17826): 1452(17826)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:24.793763 711557 usertrap_amd64.go:122] [ 1445(16340): 1445(16340)] Allocate a new trap: 0xc00b3fa090 43 D0706 16:21:24.793809 711557 usertrap_amd64.go:122] [ 1452(17826): 1452(17826)] Allocate a new trap: 0xc1e5771800 40 D0706 16:21:24.793842 711557 usertrap_amd64.go:225] [ 1445(16340): 1445(16340)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:24.795282 711557 usertrap_amd64.go:225] [ 1452(17826): 1452(17826)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:24.798096 711557 usertrap_amd64.go:212] [ 1452(17826): 1452(17826)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:24.798178 711557 usertrap_amd64.go:122] [ 1452(17826): 1452(17826)] Allocate a new trap: 0xc1e5771800 41 D0706 16:21:24.798290 711557 usertrap_amd64.go:225] [ 1452(17826): 1452(17826)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:24.800547 711557 task_exit.go:204] [ 1445(16340): 1445(16340)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.800823 711557 task_exit.go:204] [ 1445(16340): 1445(16340)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.800902 711557 task_signals.go:204] [ 1445(16340): 1451(16341)] Signal 1445, PID: 1451, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.801305 711557 task_exit.go:204] [ 1445(16340): 1451(16341)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.809319 711557 usertrap_amd64.go:212] [ 1450(15739): 1450(15739)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:24.809581 711557 usertrap_amd64.go:122] [ 1450(15739): 1450(15739)] Allocate a new trap: 0xc1e57717d0 42 D0706 16:21:24.809676 711557 usertrap_amd64.go:225] [ 1450(15739): 1450(15739)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:24.817073 711557 usertrap_amd64.go:212] [ 1452(17826): 1452(17826)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:24.817146 711557 usertrap_amd64.go:122] [ 1452(17826): 1452(17826)] Allocate a new trap: 0xc1e5771800 42 D0706 16:21:24.817282 711557 usertrap_amd64.go:225] [ 1452(17826): 1452(17826)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:24.823118 711557 usertrap_amd64.go:212] [ 1450(15739): 1453(15740)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:24.823203 711557 usertrap_amd64.go:122] [ 1450(15739): 1453(15740)] Allocate a new trap: 0xc1e57717d0 43 D0706 16:21:24.823274 711557 usertrap_amd64.go:225] [ 1450(15739): 1453(15740)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:24.824428 711557 task_exit.go:204] [ 1445(16340): 1451(16341)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.824528 711557 task_exit.go:204] [ 1445(16340): 1451(16341)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.824634 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:24.824779 711557 task_exit.go:204] [ 1445(16340): 1445(16340)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:24 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmod(r0, 0x88) (async) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000040)) (async) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f00000000c0)={{r1}, 0x3, &(0x7f0000000080)=[0x7fffffffffffffff, 0x5, 0xe44], 0x0, 0x2}) (async) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) (async) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs2/custom1\x00', 0x2, 0x0) splice(r2, &(0x7f0000000200)=0x80, r0, &(0x7f0000000240)=0xffffffffffffff15, 0x6cc, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x4, 0xffffffe1, 0x0, 0x80, 0xd7}, 0x14) (async) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x480002, 0x0) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/binder-control\x00', 0x800, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, &(0x7f0000000380)={0xb3b, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = fcntl$dupfd(r3, 0x0, r1) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) (async, rerun: 64) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)="674af01e06dc0eb691152ddbedcb38f3fa5c2aaabc37c43b49757d4122d726bbc164beaa037f2addbc2026b886f786ececafcd76fc61a6161a1af8e575f0976223ebdaf0ee91944061fc54997e3ebcbe5c8f9719520d1aa284a69e4c5d53238d350f470ab34a70ffd7b7db2ed64d9bd55a93cfea13a97f2715846fd179300feccf32b75f4f23b7", 0x87, 0x7fffffffffffffff) (rerun: 64) fcntl$setflags(r2, 0x2, 0x1) (async) r6 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r6, 0xc038943b, &(0x7f00000004c0)={0x3ff, 0x38, '\x00', 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async, rerun: 64) fcntl$setownex(r4, 0xf, &(0x7f0000000500)={0x2}) (async, rerun: 64) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000c40)={0x128, 0x0, &(0x7f0000000a40)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000540)={@flat=@binder={0x73622a85, 0xb}, @fda={0x66646185, 0x4, 0x0, 0x27}, @fda={0x66646185, 0x7, 0x2, 0x2b}}, &(0x7f00000005c0)={0x0, 0x18, 0x38}}}, @increfs_done={0x40106308, 0x2}, @increfs, @decrefs={0x40046307, 0x2}, @clear_death={0x400c630f, 0x3}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000740)={@ptr={0x70742a85, 0x1, &(0x7f0000000600)=""/18, 0x12, 0x1, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000000640)=""/220, 0xdc, 0x1, 0x3}, @fd={0x66642a85, 0x0, r0}}, &(0x7f00000007c0)={0x0, 0x28, 0x50}}}, @increfs={0x40046304, 0x1}, @acquire={0x40046305, 0x1}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x18, &(0x7f0000000980)={@ptr={0x70742a85, 0x0, &(0x7f0000000800)=""/73, 0x49, 0x2, 0xe}, @ptr={0x70742a85, 0x0, &(0x7f0000000880)=""/119, 0x77, 0x1, 0x3b}, @ptr={0x70742a85, 0x0, &(0x7f0000000900)=""/120, 0x78, 0x1, 0x9}}, &(0x7f0000000a00)={0x0, 0x28, 0x50}}}, @clear_death={0x400c630f, 0x3}], 0x89, 0x0, &(0x7f0000000b80)="ad548c6f1e66a7edd765df349d26d1f86a31c6b11ec7524b57d81db7e81921fd1e17856c5abe79f1a6f08dc7053c0ce5cd02ccdef3aa78637a98b33dcc459d3985939f6eda3746434fd8d79ab22d6c044610f65ee93b3f2d1916f374e3774bb4533d4e12037501b7689478f19930f9dba0c495dd64f483aa983f728790e3ad145d3930996720213f0e"}) open(&(0x7f0000000c80)='./file0\x00', 0x40000, 0xc0) r7 = dup2(r2, r4) r8 = socket$inet(0x2, 0xa, 0x3) shutdown(r8, 0x0) (async) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000cc0)=0xffffffffffffffff) (async, rerun: 32) r9 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000d00)='./file0\x00', 0x4000900) (rerun: 32) inotify_rm_watch(r7, r9) r10 = openat$cgroup_devices(r0, &(0x7f0000000d40)='devices.allow\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r10, 0x941c, 0x0) (async) io_submit(0x0, 0x3, &(0x7f0000002fc0)=[&(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x8, r6, &(0x7f0000000d80)="c9ed410c4b189d50762c7bb1b765bbc59d4894c82505545f5854e1dfb2a20455947f150b18e8d490f3c46e9bc5ce527d7ff9bc111aa5c06c2b92bf1b2363c2f4216b9528b2962d834cc27cc73f170f020b749b2aebbe0812414ffa5d6f028e270f59150774b76801ae4369ed1527766784bd403d07d88f065412a42918a0a87cbbcf8b967b2749c31da61496adc460c4b0b368b708f719b548712a20d91629ce3a12840481e3d1798fef168b45f9bdf4dfa89dcfda", 0xb5, 0xffffffff, 0x0, 0x2}, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x3, 0x4, r5, &(0x7f0000000ec0)="9fe85a47031738a368fc", 0xa, 0x6, 0x0, 0x1, r3}, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x3, 0x12a2, r1, &(0x7f0000000f40)="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", 0x1000, 0x7, 0x0, 0x2}]) D0706 16:21:24.831149 711557 usertrap_amd64.go:212] [ 1452(17826): 1452(17826)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:24.831261 711557 usertrap_amd64.go:122] [ 1452(17826): 1452(17826)] Allocate a new trap: 0xc1e5771800 43 D0706 16:21:24.831327 711557 usertrap_amd64.go:225] [ 1452(17826): 1452(17826)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:24.861045 711557 usertrap_amd64.go:212] [ 1457(16342): 1457(16342)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:24.861158 711557 usertrap_amd64.go:122] [ 1457(16342): 1457(16342)] Allocate a new trap: 0xc1e5771830 40 D0706 16:21:24.861924 711557 usertrap_amd64.go:225] [ 1457(16342): 1457(16342)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:24.864630 711557 usertrap_amd64.go:212] [ 1457(16342): 1457(16342)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:24.864692 711557 usertrap_amd64.go:122] [ 1457(16342): 1457(16342)] Allocate a new trap: 0xc1e5771830 41 D0706 16:21:24.864754 711557 usertrap_amd64.go:225] [ 1457(16342): 1457(16342)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:24.885959 711557 usertrap_amd64.go:212] [ 1457(16342): 1457(16342)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:24.886033 711557 usertrap_amd64.go:122] [ 1457(16342): 1457(16342)] Allocate a new trap: 0xc1e5771830 42 D0706 16:21:24.886140 711557 usertrap_amd64.go:225] [ 1457(16342): 1457(16342)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:24.891281 711557 usertrap_amd64.go:212] [ 1450(15739): 1450(15739)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:24.891427 711557 usertrap_amd64.go:122] [ 1450(15739): 1450(15739)] Allocate a new trap: 0xc1e57717d0 44 D0706 16:21:24.892102 711557 usertrap_amd64.go:225] [ 1450(15739): 1450(15739)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:24.911603 711557 usertrap_amd64.go:212] [ 1457(16342): 1457(16342)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:24.911694 711557 usertrap_amd64.go:122] [ 1457(16342): 1457(16342)] Allocate a new trap: 0xc1e5771830 43 D0706 16:21:24.911766 711557 usertrap_amd64.go:225] [ 1457(16342): 1457(16342)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:24.918890 711557 task_exit.go:204] [ 1457(16342): 1457(16342)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.919158 711557 task_signals.go:204] [ 1457(16342): 1459(16343)] Signal 1457, PID: 1459, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.919186 711557 task_signals.go:204] [ 1457(16342): 1460(16344)] Signal 1457, PID: 1460, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.919717 711557 task_signals.go:204] [ 1457(16342): 1461(16345)] Signal 1457, PID: 1461, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:24.919770 711557 task_exit.go:204] [ 1457(16342): 1459(16343)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.919919 711557 task_exit.go:204] [ 1457(16342): 1461(16345)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.920134 711557 task_exit.go:204] [ 1457(16342): 1457(16342)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.920202 711557 task_exit.go:204] [ 1457(16342): 1460(16344)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:24.920583 711557 task_exit.go:204] [ 1457(16342): 1461(16345)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.920651 711557 task_exit.go:204] [ 1457(16342): 1461(16345)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.920985 711557 task_exit.go:204] [ 1457(16342): 1459(16343)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.921148 711557 task_exit.go:204] [ 1457(16342): 1459(16343)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.928643 711557 task_exit.go:204] [ 1457(16342): 1460(16344)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:24.928743 711557 task_exit.go:204] [ 1457(16342): 1460(16344)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:24.928852 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:24.929403 711557 task_exit.go:204] [ 1457(16342): 1457(16342)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:24 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmod(r0, 0x88) (async) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000040)) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f00000000c0)={{r1}, 0x3, &(0x7f0000000080)=[0x7fffffffffffffff, 0x5, 0xe44], 0x0, 0x2}) (async, rerun: 64) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) (async, rerun: 64) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs2/custom1\x00', 0x2, 0x0) splice(r2, &(0x7f0000000200)=0x80, r0, &(0x7f0000000240)=0xffffffffffffff15, 0x6cc, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x4, 0xffffffe1, 0x0, 0x80, 0xd7}, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x480002, 0x0) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/binder-control\x00', 0x800, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, &(0x7f0000000380)={0xb3b, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) r5 = fcntl$dupfd(r3, 0x0, r1) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) (async) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)="674af01e06dc0eb691152ddbedcb38f3fa5c2aaabc37c43b49757d4122d726bbc164beaa037f2addbc2026b886f786ececafcd76fc61a6161a1af8e575f0976223ebdaf0ee91944061fc54997e3ebcbe5c8f9719520d1aa284a69e4c5d53238d350f470ab34a70ffd7b7db2ed64d9bd55a93cfea13a97f2715846fd179300feccf32b75f4f23b7", 0x87, 0x7fffffffffffffff) (async) fcntl$setflags(r2, 0x2, 0x1) (async) r6 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r6, 0xc038943b, &(0x7f00000004c0)={0x3ff, 0x38, '\x00', 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) fcntl$setownex(r4, 0xf, &(0x7f0000000500)={0x2}) (async) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000c40)={0x128, 0x0, &(0x7f0000000a40)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000540)={@flat=@binder={0x73622a85, 0xb}, @fda={0x66646185, 0x4, 0x0, 0x27}, @fda={0x66646185, 0x7, 0x2, 0x2b}}, &(0x7f00000005c0)={0x0, 0x18, 0x38}}}, @increfs_done={0x40106308, 0x2}, @increfs, @decrefs={0x40046307, 0x2}, @clear_death={0x400c630f, 0x3}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000740)={@ptr={0x70742a85, 0x1, &(0x7f0000000600)=""/18, 0x12, 0x1, 0x34}, @ptr={0x70742a85, 0x1, &(0x7f0000000640)=""/220, 0xdc, 0x1, 0x3}, @fd={0x66642a85, 0x0, r0}}, &(0x7f00000007c0)={0x0, 0x28, 0x50}}}, @increfs={0x40046304, 0x1}, @acquire={0x40046305, 0x1}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x18, &(0x7f0000000980)={@ptr={0x70742a85, 0x0, &(0x7f0000000800)=""/73, 0x49, 0x2, 0xe}, @ptr={0x70742a85, 0x0, &(0x7f0000000880)=""/119, 0x77, 0x1, 0x3b}, @ptr={0x70742a85, 0x0, &(0x7f0000000900)=""/120, 0x78, 0x1, 0x9}}, &(0x7f0000000a00)={0x0, 0x28, 0x50}}}, @clear_death={0x400c630f, 0x3}], 0x89, 0x0, &(0x7f0000000b80)="ad548c6f1e66a7edd765df349d26d1f86a31c6b11ec7524b57d81db7e81921fd1e17856c5abe79f1a6f08dc7053c0ce5cd02ccdef3aa78637a98b33dcc459d3985939f6eda3746434fd8d79ab22d6c044610f65ee93b3f2d1916f374e3774bb4533d4e12037501b7689478f19930f9dba0c495dd64f483aa983f728790e3ad145d3930996720213f0e"}) open(&(0x7f0000000c80)='./file0\x00', 0x40000, 0xc0) (async) r7 = dup2(r2, r4) r8 = socket$inet(0x2, 0xa, 0x3) shutdown(r8, 0x0) (async) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000cc0)=0xffffffffffffffff) r9 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000d00)='./file0\x00', 0x4000900) inotify_rm_watch(r7, r9) (async, rerun: 64) r10 = openat$cgroup_devices(r0, &(0x7f0000000d40)='devices.allow\x00', 0x2, 0x0) (rerun: 64) ioctl$BTRFS_IOC_SCRUB_CANCEL(r10, 0x941c, 0x0) (async) io_submit(0x0, 0x3, &(0x7f0000002fc0)=[&(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x8, r6, &(0x7f0000000d80)="c9ed410c4b189d50762c7bb1b765bbc59d4894c82505545f5854e1dfb2a20455947f150b18e8d490f3c46e9bc5ce527d7ff9bc111aa5c06c2b92bf1b2363c2f4216b9528b2962d834cc27cc73f170f020b749b2aebbe0812414ffa5d6f028e270f59150774b76801ae4369ed1527766784bd403d07d88f065412a42918a0a87cbbcf8b967b2749c31da61496adc460c4b0b368b708f719b548712a20d91629ce3a12840481e3d1798fef168b45f9bdf4dfa89dcfda", 0xb5, 0xffffffff, 0x0, 0x2}, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x3, 0x4, r5, &(0x7f0000000ec0)="9fe85a47031738a368fc", 0xa, 0x6, 0x0, 0x1, r3}, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x3, 0x12a2, r1, &(0x7f0000000f40)="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", 0x1000, 0x7, 0x0, 0x2}]) D0706 16:21:24.970964 711557 usertrap_amd64.go:212] [ 1462(16346): 1462(16346)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:24.971076 711557 usertrap_amd64.go:122] [ 1462(16346): 1462(16346)] Allocate a new trap: 0xc00c210ff0 40 D0706 16:21:24.971956 711557 usertrap_amd64.go:225] [ 1462(16346): 1462(16346)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:24.975636 711557 usertrap_amd64.go:212] [ 1462(16346): 1462(16346)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:24.975764 711557 usertrap_amd64.go:122] [ 1462(16346): 1462(16346)] Allocate a new trap: 0xc00c210ff0 41 D0706 16:21:24.977134 711557 usertrap_amd64.go:225] [ 1462(16346): 1462(16346)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:24.997203 711557 usertrap_amd64.go:212] [ 1462(16346): 1462(16346)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:24.997440 711557 usertrap_amd64.go:122] [ 1462(16346): 1462(16346)] Allocate a new trap: 0xc00c210ff0 42 D0706 16:21:24.997566 711557 usertrap_amd64.go:225] [ 1462(16346): 1462(16346)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:25.021166 711557 usertrap_amd64.go:212] [ 1462(16346): 1462(16346)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:25.021256 711557 usertrap_amd64.go:122] [ 1462(16346): 1462(16346)] Allocate a new trap: 0xc00c210ff0 43 D0706 16:21:25.021329 711557 usertrap_amd64.go:225] [ 1462(16346): 1462(16346)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:25.026933 711557 task_exit.go:204] [ 1462(16346): 1462(16346)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.027131 711557 task_signals.go:204] [ 1462(16346): 1464(16348)] Signal 1462, PID: 1464, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.027175 711557 task_signals.go:204] [ 1462(16346): 1465(16349)] Signal 1462, PID: 1465, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.027308 711557 task_signals.go:204] [ 1462(16346): 1463(16347)] Signal 1462, PID: 1463, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.027389 711557 task_signals.go:204] [ 1462(16346): 1466(16350)] Signal 1462, PID: 1466, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.027522 711557 task_exit.go:204] [ 1462(16346): 1462(16346)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.028270 711557 task_exit.go:204] [ 1462(16346): 1464(16348)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.028450 711557 task_exit.go:204] [ 1462(16346): 1465(16349)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.028605 711557 task_exit.go:204] [ 1462(16346): 1463(16347)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.028866 711557 task_exit.go:204] [ 1462(16346): 1466(16350)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.029105 711557 task_exit.go:204] [ 1462(16346): 1465(16349)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.029176 711557 task_exit.go:204] [ 1462(16346): 1465(16349)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.029364 711557 task_exit.go:204] [ 1462(16346): 1464(16348)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.029459 711557 task_exit.go:204] [ 1462(16346): 1464(16348)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.029800 711557 task_exit.go:204] [ 1462(16346): 1463(16347)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.029907 711557 task_exit.go:204] [ 1462(16346): 1463(16347)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.038894 711557 task_exit.go:204] [ 1462(16346): 1466(16350)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.038967 711557 task_exit.go:204] [ 1462(16346): 1466(16350)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.039057 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:25.040492 711557 usertrap_amd64.go:212] [ 1438(16972): 1438(16972)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:25.040529 711557 task_exit.go:204] [ 1462(16346): 1462(16346)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.040628 711557 usertrap_amd64.go:122] [ 1438(16972): 1438(16972)] Allocate a new trap: 0xc00b3fa060 45 D0706 16:21:25.040748 711557 usertrap_amd64.go:225] [ 1438(16972): 1438(16972)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) 16:21:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x3]}, 0x8, 0x80400) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000010}) D0706 16:21:25.045523 711557 task_exit.go:204] [ 1438(16972): 1438(16972)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.045742 711557 task_exit.go:204] [ 1438(16972): 1438(16972)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.045836 711557 task_signals.go:204] [ 1438(16972): 1439(16973)] Signal 1438, PID: 1439, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.045946 711557 task_exit.go:204] [ 1438(16972): 1439(16973)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.046089 711557 task_signals.go:204] [ 1438(16972): 1448(16976)] Signal 1438, PID: 1448, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.046228 711557 task_exit.go:204] [ 1438(16972): 1448(16976)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.046402 711557 task_exit.go:204] [ 1438(16972): 1448(16976)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.046454 711557 task_exit.go:204] [ 1438(16972): 1448(16976)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.046583 711557 task_signals.go:204] [ 1438(16972): 1447(16975)] Signal 1438, PID: 1447, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.046613 711557 task_signals.go:204] [ 1438(16972): 1449(16977)] Signal 1438, PID: 1449, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.046856 711557 task_signals.go:204] [ 1438(16972): 1446(16974)] Signal 1438, PID: 1446, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.047340 711557 task_exit.go:204] [ 1438(16972): 1446(16974)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.047636 711557 task_exit.go:204] [ 1438(16972): 1439(16973)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.047709 711557 task_exit.go:204] [ 1438(16972): 1439(16973)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.047814 711557 task_exit.go:204] [ 1438(16972): 1446(16974)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.047877 711557 task_exit.go:204] [ 1438(16972): 1446(16974)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.047982 711557 task_exit.go:204] [ 1438(16972): 1447(16975)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.048077 711557 task_exit.go:204] [ 1438(16972): 1449(16977)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.048901 711557 task_exit.go:204] [ 1438(16972): 1449(16977)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.049043 711557 task_exit.go:204] [ 1438(16972): 1449(16977)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.057834 711557 task_exit.go:204] [ 1438(16972): 1447(16975)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.057910 711557 task_exit.go:204] [ 1438(16972): 1447(16975)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.058007 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:25.059137 711557 task_exit.go:204] [ 1438(16972): 1438(16972)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:25 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) r3 = syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f0000001e00)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:25.077217 711557 usertrap_amd64.go:212] [ 1467(16351): 1467(16351)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:25.077346 711557 usertrap_amd64.go:122] [ 1467(16351): 1467(16351)] Allocate a new trap: 0xc00b3fa0f0 40 D0706 16:21:25.078758 711557 usertrap_amd64.go:225] [ 1467(16351): 1467(16351)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:25.083880 711557 usertrap_amd64.go:212] [ 1467(16351): 1467(16351)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:25.083955 711557 usertrap_amd64.go:122] [ 1467(16351): 1467(16351)] Allocate a new trap: 0xc00b3fa0f0 41 D0706 16:21:25.318984 711557 usertrap_amd64.go:225] [ 1467(16351): 1467(16351)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:25.319045 711557 usertrap_amd64.go:212] [ 1452(17826): 1452(17826)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:25.319097 711557 usertrap_amd64.go:122] [ 1452(17826): 1452(17826)] Allocate a new trap: 0xc1e5771800 44 D0706 16:21:25.319167 711557 usertrap_amd64.go:225] [ 1452(17826): 1452(17826)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:25.326874 711557 task_exit.go:204] [ 1452(17826): 1452(17826)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.327042 711557 task_signals.go:204] [ 1452(17826): 1454(17827)] Signal 1452, PID: 1454, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.327064 711557 task_signals.go:204] [ 1452(17826): 1456(17829)] Signal 1452, PID: 1456, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.327145 711557 task_exit.go:204] [ 1452(17826): 1454(17827)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.327449 711557 task_signals.go:204] [ 1452(17826): 1455(17828)] Signal 1452, PID: 1455, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.327542 711557 task_exit.go:204] [ 1452(17826): 1456(17829)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.327935 711557 task_exit.go:204] [ 1452(17826): 1454(17827)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.328011 711557 task_exit.go:204] [ 1452(17826): 1454(17827)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.328168 711557 task_exit.go:204] [ 1452(17826): 1452(17826)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.328380 711557 task_exit.go:204] [ 1452(17826): 1455(17828)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.329223 711557 task_exit.go:204] [ 1452(17826): 1456(17829)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.329396 711557 task_exit.go:204] [ 1452(17826): 1456(17829)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.337411 711557 task_exit.go:204] [ 1452(17826): 1455(17828)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.337538 711557 task_exit.go:204] [ 1452(17826): 1455(17828)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.337661 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:25.338649 711557 task_exit.go:204] [ 1452(17826): 1452(17826)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:25 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) setrlimit(0x4, &(0x7f00000000c0)={0xfffffffffffffffb, 0x1}) dup(0xffffffffffffffff) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$VT_RELDISP(r0, 0x5605) statx(r0, &(0x7f0000008480)='./bus\x00', 0x6000, 0x79dd2668b14e6dfa, 0x0) D0706 16:21:25.413635 711557 usertrap_amd64.go:212] [ 1468(16978): 1468(16978)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:25.413764 711557 usertrap_amd64.go:122] [ 1468(16978): 1468(16978)] Allocate a new trap: 0xc176897e30 40 D0706 16:21:25.414565 711557 usertrap_amd64.go:225] [ 1468(16978): 1468(16978)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:25.420648 711557 usertrap_amd64.go:212] [ 1468(16978): 1468(16978)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:25.420711 711557 usertrap_amd64.go:122] [ 1468(16978): 1468(16978)] Allocate a new trap: 0xc176897e30 41 D0706 16:21:25.420847 711557 usertrap_amd64.go:225] [ 1468(16978): 1468(16978)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:25.424722 711557 usertrap_amd64.go:212] [ 1467(16351): 1467(16351)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:25.424896 711557 usertrap_amd64.go:122] [ 1467(16351): 1467(16351)] Allocate a new trap: 0xc00b3fa0f0 42 D0706 16:21:25.425098 711557 usertrap_amd64.go:225] [ 1467(16351): 1467(16351)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:25.438601 711557 usertrap_amd64.go:212] [ 1469(17830): 1469(17830)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:25.438728 711557 usertrap_amd64.go:122] [ 1469(17830): 1469(17830)] Allocate a new trap: 0xc176897e60 40 D0706 16:21:25.439605 711557 usertrap_amd64.go:225] [ 1469(17830): 1469(17830)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:25.439980 711557 usertrap_amd64.go:212] [ 1467(16351): 1467(16351)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:25.440097 711557 usertrap_amd64.go:122] [ 1467(16351): 1467(16351)] Allocate a new trap: 0xc00b3fa0f0 43 D0706 16:21:25.440229 711557 usertrap_amd64.go:225] [ 1467(16351): 1467(16351)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:25.444922 711557 usertrap_amd64.go:212] [ 1469(17830): 1469(17830)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:25.445027 711557 usertrap_amd64.go:122] [ 1469(17830): 1469(17830)] Allocate a new trap: 0xc176897e60 41 D0706 16:21:25.445116 711557 usertrap_amd64.go:225] [ 1469(17830): 1469(17830)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:25.447360 711557 usertrap_amd64.go:212] [ 1468(16978): 1468(16978)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:25.447422 711557 usertrap_amd64.go:122] [ 1468(16978): 1468(16978)] Allocate a new trap: 0xc176897e30 42 D0706 16:21:25.447484 711557 usertrap_amd64.go:225] [ 1468(16978): 1468(16978)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:25.458440 711557 task_exit.go:204] [ 1467(16351): 1467(16351)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.458730 711557 task_exit.go:204] [ 1467(16351): 1467(16351)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.458917 711557 task_signals.go:204] [ 1467(16351): 1470(16352)] Signal 1467, PID: 1470, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.459066 711557 task_exit.go:204] [ 1467(16351): 1470(16352)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.467221 711557 task_exit.go:204] [ 1467(16351): 1470(16352)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.467282 711557 task_exit.go:204] [ 1467(16351): 1470(16352)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.467342 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:25.468012 711557 task_exit.go:204] [ 1467(16351): 1467(16351)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.468238 711557 usertrap_amd64.go:212] [ 1468(16978): 1471(16979)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:25.468302 711557 usertrap_amd64.go:212] [ 1469(17830): 1469(17830)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:25.468297 711557 usertrap_amd64.go:122] [ 1468(16978): 1471(16979)] Allocate a new trap: 0xc176897e30 43 D0706 16:21:25.468344 711557 usertrap_amd64.go:122] [ 1469(17830): 1469(17830)] Allocate a new trap: 0xc176897e60 42 D0706 16:21:25.468403 711557 usertrap_amd64.go:225] [ 1468(16978): 1471(16979)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:25.468470 711557 usertrap_amd64.go:225] [ 1469(17830): 1469(17830)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) 16:21:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) (async, rerun: 64) r1 = signalfd4(r0, &(0x7f0000000000)={[0x3]}, 0x8, 0x80400) (rerun: 64) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000010}) D0706 16:21:25.499978 711557 usertrap_amd64.go:212] [ 1473(16353): 1473(16353)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:25.500063 711557 usertrap_amd64.go:122] [ 1473(16353): 1473(16353)] Allocate a new trap: 0xc1e5771890 40 D0706 16:21:25.501049 711557 usertrap_amd64.go:225] [ 1473(16353): 1473(16353)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:25.503569 711557 usertrap_amd64.go:212] [ 1473(16353): 1473(16353)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:25.503650 711557 usertrap_amd64.go:122] [ 1473(16353): 1473(16353)] Allocate a new trap: 0xc1e5771890 41 D0706 16:21:25.503756 711557 usertrap_amd64.go:225] [ 1473(16353): 1473(16353)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:25.519951 711557 usertrap_amd64.go:212] [ 1473(16353): 1473(16353)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:25.520030 711557 usertrap_amd64.go:122] [ 1473(16353): 1473(16353)] Allocate a new trap: 0xc1e5771890 42 D0706 16:21:25.520257 711557 usertrap_amd64.go:225] [ 1473(16353): 1473(16353)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:25.532587 711557 usertrap_amd64.go:212] [ 1468(16978): 1468(16978)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:25.532685 711557 usertrap_amd64.go:122] [ 1468(16978): 1468(16978)] Allocate a new trap: 0xc176897e30 44 D0706 16:21:25.532752 711557 usertrap_amd64.go:225] [ 1468(16978): 1468(16978)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:25.534687 711557 usertrap_amd64.go:212] [ 1473(16353): 1473(16353)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:25.534737 711557 usertrap_amd64.go:122] [ 1473(16353): 1473(16353)] Allocate a new trap: 0xc1e5771890 43 D0706 16:21:25.534842 711557 usertrap_amd64.go:225] [ 1473(16353): 1473(16353)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:25.538545 711557 task_exit.go:204] [ 1473(16353): 1473(16353)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.538886 711557 task_signals.go:204] [ 1473(16353): 1476(16355)] Signal 1473, PID: 1476, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.538879 711557 task_signals.go:204] [ 1473(16353): 1474(16354)] Signal 1473, PID: 1474, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.538988 711557 task_exit.go:204] [ 1473(16353): 1476(16355)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.539165 711557 task_exit.go:204] [ 1473(16353): 1474(16354)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.539475 711557 task_exit.go:204] [ 1473(16353): 1473(16353)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.539705 711557 task_exit.go:204] [ 1473(16353): 1476(16355)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.539763 711557 task_exit.go:204] [ 1473(16353): 1476(16355)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.546627 711557 task_exit.go:204] [ 1473(16353): 1474(16354)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.546692 711557 task_exit.go:204] [ 1473(16353): 1474(16354)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.546782 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:25.547187 711557 task_exit.go:204] [ 1473(16353): 1473(16353)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.586941 711557 usertrap_amd64.go:212] [ 1469(17830): 1469(17830)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:25.587052 711557 usertrap_amd64.go:122] [ 1469(17830): 1469(17830)] Allocate a new trap: 0xc176897e60 43 D0706 16:21:25.587152 711557 usertrap_amd64.go:225] [ 1469(17830): 1469(17830)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:25.626070 711557 usertrap_amd64.go:212] [ 1450(15739): 1450(15739)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:25.626220 711557 usertrap_amd64.go:122] [ 1450(15739): 1450(15739)] Allocate a new trap: 0xc1e57717d0 45 D0706 16:21:25.626317 711557 usertrap_amd64.go:225] [ 1450(15739): 1450(15739)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:25.630974 711557 task_exit.go:204] [ 1450(15739): 1450(15739)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.631278 711557 task_signals.go:204] [ 1450(15739): 1458(15741)] Signal 1450, PID: 1458, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.631532 711557 task_signals.go:204] [ 1450(15739): 1453(15740)] Signal 1450, PID: 1453, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.631615 711557 task_exit.go:204] [ 1450(15739): 1450(15739)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.631939 711557 task_exit.go:204] [ 1450(15739): 1458(15741)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.632154 711557 task_exit.go:204] [ 1450(15739): 1458(15741)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.632195 711557 task_exit.go:204] [ 1450(15739): 1458(15741)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.632324 711557 task_exit.go:204] [ 1450(15739): 1453(15740)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.640115 711557 task_exit.go:204] [ 1450(15739): 1453(15740)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.640200 711557 task_exit.go:204] [ 1450(15739): 1453(15740)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.640302 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:25.640570 711557 task_exit.go:204] [ 1450(15739): 1450(15739)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:25 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x3]}, 0x8, 0x80400) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000010}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) (async) signalfd4(r0, &(0x7f0000000000)={[0x3]}, 0x8, 0x80400) (async) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000010}) (async) D0706 16:21:25.916870 711557 usertrap_amd64.go:212] [ 1469(17830): 1469(17830)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:25.916977 711557 usertrap_amd64.go:122] [ 1469(17830): 1469(17830)] Allocate a new trap: 0xc176897e60 44 D0706 16:21:25.917061 711557 usertrap_amd64.go:225] [ 1469(17830): 1469(17830)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:25.931362 711557 task_exit.go:204] [ 1469(17830): 1469(17830)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.931529 711557 task_signals.go:204] [ 1469(17830): 1477(17832)] Signal 1469, PID: 1477, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.931569 711557 task_signals.go:204] [ 1469(17830): 1478(17833)] Signal 1469, PID: 1478, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.931669 711557 task_signals.go:204] [ 1469(17830): 1472(17831)] Signal 1469, PID: 1472, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:25.931708 711557 task_exit.go:204] [ 1469(17830): 1478(17833)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.932002 711557 task_exit.go:204] [ 1469(17830): 1477(17832)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.932716 711557 task_exit.go:204] [ 1469(17830): 1469(17830)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.932880 711557 task_exit.go:204] [ 1469(17830): 1472(17831)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:25.933321 711557 task_exit.go:204] [ 1469(17830): 1477(17832)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.933396 711557 task_exit.go:204] [ 1469(17830): 1477(17832)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.933560 711557 task_exit.go:204] [ 1469(17830): 1478(17833)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.933607 711557 task_exit.go:204] [ 1469(17830): 1478(17833)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.947000 711557 task_exit.go:204] [ 1469(17830): 1472(17831)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:25.947063 711557 task_exit.go:204] [ 1469(17830): 1472(17831)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:25.947129 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:25.947621 711557 task_exit.go:204] [ 1469(17830): 1469(17830)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:25 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) setrlimit(0x4, &(0x7f00000000c0)={0xfffffffffffffffb, 0x1}) (async) setrlimit(0x4, &(0x7f00000000c0)={0xfffffffffffffffb, 0x1}) dup(0xffffffffffffffff) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$VT_RELDISP(r0, 0x5605) statx(r0, &(0x7f0000008480)='./bus\x00', 0x6000, 0x79dd2668b14e6dfa, 0x0) D0706 16:21:26.028090 711557 usertrap_amd64.go:212] [ 1479(16356): 1479(16356)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:26.028213 711557 usertrap_amd64.go:122] [ 1479(16356): 1479(16356)] Allocate a new trap: 0xc000475350 40 D0706 16:21:26.029309 711557 usertrap_amd64.go:225] [ 1479(16356): 1479(16356)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:26.030792 711557 usertrap_amd64.go:212] [ 1480(15742): 1480(15742)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:26.030903 711557 usertrap_amd64.go:122] [ 1480(15742): 1480(15742)] Allocate a new trap: 0xc0089189f0 40 D0706 16:21:26.031781 711557 usertrap_amd64.go:225] [ 1480(15742): 1480(15742)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:26.033588 711557 usertrap_amd64.go:212] [ 1479(16356): 1479(16356)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:26.033729 711557 usertrap_amd64.go:122] [ 1479(16356): 1479(16356)] Allocate a new trap: 0xc000475350 41 D0706 16:21:26.033850 711557 usertrap_amd64.go:225] [ 1479(16356): 1479(16356)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:26.035559 711557 usertrap_amd64.go:212] [ 1480(15742): 1480(15742)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:26.035636 711557 usertrap_amd64.go:122] [ 1480(15742): 1480(15742)] Allocate a new trap: 0xc0089189f0 41 D0706 16:21:26.035744 711557 usertrap_amd64.go:225] [ 1480(15742): 1480(15742)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:26.050018 711557 usertrap_amd64.go:212] [ 1481(17834): 1481(17834)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:26.050126 711557 usertrap_amd64.go:122] [ 1481(17834): 1481(17834)] Allocate a new trap: 0xc00fc59da0 40 D0706 16:21:26.050820 711557 usertrap_amd64.go:225] [ 1481(17834): 1481(17834)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:26.063810 711557 usertrap_amd64.go:212] [ 1480(15742): 1480(15742)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:26.063964 711557 usertrap_amd64.go:122] [ 1480(15742): 1480(15742)] Allocate a new trap: 0xc0089189f0 42 D0706 16:21:26.064093 711557 usertrap_amd64.go:225] [ 1480(15742): 1480(15742)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:26.065205 711557 usertrap_amd64.go:212] [ 1481(17834): 1481(17834)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:26.065317 711557 usertrap_amd64.go:122] [ 1481(17834): 1481(17834)] Allocate a new trap: 0xc00fc59da0 41 D0706 16:21:26.065388 711557 usertrap_amd64.go:225] [ 1481(17834): 1481(17834)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:26.077951 711557 usertrap_amd64.go:212] [ 1479(16356): 1479(16356)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:26.078042 711557 usertrap_amd64.go:122] [ 1479(16356): 1479(16356)] Allocate a new trap: 0xc000475350 42 D0706 16:21:26.078178 711557 usertrap_amd64.go:225] [ 1479(16356): 1479(16356)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:26.080279 711557 usertrap_amd64.go:212] [ 1480(15742): 1482(15743)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:26.080371 711557 usertrap_amd64.go:122] [ 1480(15742): 1482(15743)] Allocate a new trap: 0xc0089189f0 43 D0706 16:21:26.080469 711557 usertrap_amd64.go:225] [ 1480(15742): 1482(15743)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:26.105062 711557 usertrap_amd64.go:212] [ 1481(17834): 1481(17834)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:26.105152 711557 usertrap_amd64.go:122] [ 1481(17834): 1481(17834)] Allocate a new trap: 0xc00fc59da0 42 D0706 16:21:26.105160 711557 usertrap_amd64.go:212] [ 1479(16356): 1479(16356)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:26.105249 711557 usertrap_amd64.go:122] [ 1479(16356): 1479(16356)] Allocate a new trap: 0xc000475350 43 D0706 16:21:26.105276 711557 usertrap_amd64.go:225] [ 1481(17834): 1481(17834)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:26.105342 711557 usertrap_amd64.go:225] [ 1479(16356): 1479(16356)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:26.107775 711557 usertrap_amd64.go:212] [ 1479(16356): 1479(16356)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:26.107838 711557 usertrap_amd64.go:122] [ 1479(16356): 1479(16356)] Allocate a new trap: 0xc000475350 44 D0706 16:21:26.107957 711557 usertrap_amd64.go:225] [ 1479(16356): 1479(16356)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:26.115730 711557 task_exit.go:204] [ 1479(16356): 1479(16356)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.115971 711557 task_exit.go:204] [ 1479(16356): 1479(16356)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.116134 711557 task_signals.go:204] [ 1479(16356): 1483(16357)] Signal 1479, PID: 1483, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.116253 711557 task_signals.go:204] [ 1479(16356): 1485(16359)] Signal 1479, PID: 1485, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.116303 711557 task_exit.go:204] [ 1479(16356): 1483(16357)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.116705 711557 task_signals.go:204] [ 1479(16356): 1484(16358)] Signal 1479, PID: 1484, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.116781 711557 task_exit.go:204] [ 1479(16356): 1485(16359)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.117079 711557 task_exit.go:204] [ 1479(16356): 1485(16359)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.117125 711557 task_exit.go:204] [ 1479(16356): 1485(16359)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.117220 711557 task_exit.go:204] [ 1479(16356): 1484(16358)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.117376 711557 task_exit.go:204] [ 1479(16356): 1484(16358)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.117428 711557 task_exit.go:204] [ 1479(16356): 1484(16358)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.124859 711557 task_exit.go:204] [ 1479(16356): 1483(16357)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.124928 711557 task_exit.go:204] [ 1479(16356): 1483(16357)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.125097 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:26.125300 711557 task_exit.go:204] [ 1479(16356): 1479(16356)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:26 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x80800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080)={0x3b, 0x13, '\x00', [@generic={0x0, 0x14, "fbb26a1311213d1412cc301b5278c075fd1dbd93"}, @calipso={0x7, 0x20, {0x3, 0x6, 0x2, 0xb8, [0x7, 0x9, 0x1]}}, @generic={0x4, 0x5d, "b4c97742d8b0c8bb7a8b490a72ecfca059ae80ad1461904ad516fa099b35b86cfe23c352471f2b09a6ebbf5c5467cde74297064d968c031db89c5c5a5153c441073e80bf6a0e91d277dd36b6c40f29cba4af683d164a46cc8817be67a5"}, @pad1, @ra={0x5, 0x2, 0xc5}]}, 0xa8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@hopopts={0x2b, 0x1c, '\x00', [@generic={0x9, 0xdb, "6d4a7be381caae6306711dbf8abef0d0b69a95b4149de20edb696da0211746d1020d771125dec1631a664412ba617520d6ac67e1bf5362df245ca3730edfdcf3f116e1aa8fa5068b92b73df2b55a96c86e7a171f63b595968c2ed4b769fb734c367b5550df1ec967780d3793b15739374d75a8bd2405744f9850bbe4af148e05cee98a502722120990789e1f81be8eb6343b5a3c2176d669567ffa7bd960798ce4bcf2638bcad6af702a09833593e0274220888f2c59df41945b071b0865e4981e13eb1bafe5fc2f32e4f557d5628807394853fb8a251a84f06eb6"}, @jumbo={0xc2, 0x4, 0x7fff8000}]}, 0xf0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x4, 0xb4, 0x7, 0x7, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x8000, 0x7, 0xffffff4e}}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300)={@mcast1, r2}, 0x14) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000007c0)={r5, r7, "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", "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"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000017c0)='net/udplite\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001800)={0x9, [{r6, r5}, {r3}, {r3, r5}, {r7}, {0x0, r5}, {r3, r8}, {r6, r8}, {r3, r8}, {r6, r9}, {r4, r8}, {0x0, r8}, {r4, r8}, {r7, r5}, {r6, r9}, {r3, r9}, {r10, r5}, {r4, r5}, {}, {r7, r5}, {r4, r5}, {r7, r8}, {r6, r8}, {r7, r8}, {r4, r5}, {r3, r5}, {r4, r8}, {r6, r9}, {r6}, {r10, r9}, {r6, r5}, {r7}, {r4}, {r3, r8}, {r7, r9}, {0x0, r8}, {r3, r8}, {r7, r9}, {r10, r9}, {r6, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {0x0, r9}, {r3, r8}, {0x0, r8}, {r10, r8}, {r7, r5}, {r7, r5}, {r4, r9}, {r3, r8}, {r3}, {r3, r8}, {r7, r8}, {r7, r9}, {r3, r5}, {r4, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r7, r9}, {r10}, {r3, r8}, {r10}, {r4}, {r7, r9}, {r3, r5}, {r6, r8}, {r6, r5}, {0x0, r5}, {r6, r9}, {r4, r5}, {r7, r5}, {r6, r8}, {r6, r5}, {r6}, {r3, r8}, {r6}, {r7, r5}, {r3, r9}, {r4, r8}, {0x0, r5}, {r7, r5}, {r4, r9}, {r10, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r4, r9}, {r10, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {r6, r9}, {r3, r5}, {r10, r8}, {r7, r8}, {r10, r8}, {}, {r6, r8}, {r3, r8}, {r4, r5}, {r3, r8}, {r7, r5}, {r4, r5}, {0x0, r5}, {r7, r5}, {r4, r5}, {r7, r5}, {0x0, r8}, {r10, r5}, {r3, r5}, {r6, r5}, {r4}, {r7, r5}, {r7, r8}, {r4, r9}, {r10, r9}, {r3, r9}, {0x0, r9}, {0x0, r8}, {r4, r8}, {r10, r5}, {0x0, r5}, {r3, r9}, {r4, r8}, {r3}, {r7, r9}, {r7, r8}, {r6, r5}, {r6, r9}, {r6, r8}, {r7, r5}, {r10, r5}, {r6, r5}, {r10}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r4}, {r6, r8}, {r4, r8}, {r7, r5}, {r3, r8}, {r7, r8}, {r10}, {r3, r9}, {r7, r9}, {r10, r8}, {r6, r5}, {0x0, r8}, {0x0, r9}, {r4, r9}, {0x0, r9}, {r3, r5}, {r3, r9}, {r7, r5}, {r6, r8}, {r6, r8}, {r10, r8}, {r10, r5}, {}, {r6, r9}, {r3}, {r3}, {0x0, r9}, {r4, r8}, {r10}, {r4, r9}, {r6, r5}, {r3, r8}, {r6}, {r6, r9}, {r6, r8}, {r3, r5}, {r6, r5}, {0x0, r5}, {r4, r8}, {r4}, {0x0, r5}, {r4, r8}, {r10}, {r4, r5}, {r6, r8}, {r6, r9}, {r3, r8}, {r7, r5}, {r4, r8}, {0x0, r8}, {0x0, r8}, {r3}, {r4, r5}, {r6, r5}, {r10, r5}, {r3, r5}, {r10, r9}, {r6, r8}, {r3, r8}, {r7, r5}, {0x0, r9}, {r7, r8}, {r10, r5}, {0x0, r5}, {r3, r8}, {r4}, {r10, r9}, {r7, r8}, {r4, r5}, {r6, r5}, {r3, r5}, {r4, r9}, {r6, r8}, {r3}, {r3}, {r3}, {r3, r8}, {r3, r8}, {r6, r8}, {r6, r8}, {r4, r5}, {r10, r8}, {r6, r9}, {r6, r5}, {0x0, r9}, {r3, r9}, {r3, r5}, {r10, r9}, {r10}, {0x0, r9}, {r7, r8}, {r7, r8}, {r3, r9}, {0x0, r9}, {r6, r8}, {r7, r8}, {r6, r9}, {r6, r9}, {r7, r9}, {r10, r5}, {r10, r5}, {r3, r5}, {r10, r8}, {r10, r5}, {r7, r5}, {r6}, {}, {r6, r5}, {r3}, {0x0, r9}, {r4}, {r7, r9}, {r7, r9}, {r3, r8}, {r3, r9}], 0x7, "a2eeb4b849d8ac"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000002800)={{r12, 0x9, 0x7fffffff, 0xffffffffffffffff, 0x100000000, 0x6, 0x80000001, 0x1, 0x3000000, 0x2ad1, 0x3ff, 0x1000, 0x20, 0xfc0000, 0x5}}) setsockopt$inet6_icmp_ICMP_FILTER(r11, 0x1, 0x1, &(0x7f0000003800)={0x8000}, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000003840)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r11, 0x5000943f, &(0x7f0000003a40)={{r1}, r14, 0x1e, @unused=[0x3, 0x2, 0x7, 0x200], @subvolid=0x43}) r15 = ioctl$TIOCGPTPEER(r11, 0x5441, 0x30) r16 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000004a40)={r13, 0xfffffffffffff5c3}) ioctl$PIO_CMAP(r15, 0x4b71, &(0x7f0000005a40)={0x80, 0xffff, 0x9, 0xc0c, 0x9, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFSUUID(r17, 0x4008662c, &(0x7f0000005ac0)={0x0, 0x0, "c303484699c15c7d0b53b32f281c6331"}) ioctl$TIOCSWINSZ(r11, 0x5414, &(0x7f0000005b00)={0x1, 0xc9, 0x99, 0x9}) write$P9_RSTATFS(r11, &(0x7f0000005b40)={0x43, 0x9, 0x2, {0xff, 0x547, 0x400, 0x2, 0x100000001, 0x30, 0x5, 0x24, 0x81}}, 0x43) r19 = dup2(r16, r18) write$P9_RSTAT(r19, &(0x7f0000005bc0)={0x4a, 0x7d, 0x1, {0x0, 0x43, 0x4a00, 0x80, {0x1, 0x1, 0x2}, 0x8810000, 0xb7, 0xffffff81, 0x6, 0x6, 'icmp6\x00', 0x1, '\x00', 0x6, 'icmp6\x00', 0x3, ',/)'}}, 0x4a) write$P9_RUNLINKAT(r19, &(0x7f0000005c40)={0x7, 0x4d, 0x2}, 0x7) ioctl$EXT4_IOC_SETFSUUID(0xffffffffffffffff, 0x4008662c, &(0x7f0000005c80)={0x10, 0x0, "2f512a602c090b52c32f31230b338e3f"}) r20 = getpgrp(0x0) fcntl$lock(r0, 0x7, &(0x7f0000005cc0)={0x2, 0x0, 0xffffffffffffffff, 0x6, r20}) D0706 16:21:26.148542 711557 usertrap_amd64.go:212] [ 1480(15742): 1480(15742)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:26.148621 711557 usertrap_amd64.go:122] [ 1480(15742): 1480(15742)] Allocate a new trap: 0xc0089189f0 44 D0706 16:21:26.148691 711557 usertrap_amd64.go:225] [ 1480(15742): 1480(15742)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:26.161338 711557 usertrap_amd64.go:212] [ 1489(16360): 1489(16360)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:26.161491 711557 usertrap_amd64.go:122] [ 1489(16360): 1489(16360)] Allocate a new trap: 0xc00b3fa120 40 D0706 16:21:26.162326 711557 usertrap_amd64.go:225] [ 1489(16360): 1489(16360)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:26.165432 711557 usertrap_amd64.go:212] [ 1489(16360): 1489(16360)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:26.165493 711557 usertrap_amd64.go:122] [ 1489(16360): 1489(16360)] Allocate a new trap: 0xc00b3fa120 41 D0706 16:21:26.165589 711557 usertrap_amd64.go:225] [ 1489(16360): 1489(16360)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:26.218855 711557 usertrap_amd64.go:212] [ 1481(17834): 1481(17834)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:26.219023 711557 usertrap_amd64.go:122] [ 1481(17834): 1481(17834)] Allocate a new trap: 0xc00fc59da0 43 D0706 16:21:26.219160 711557 usertrap_amd64.go:225] [ 1481(17834): 1481(17834)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:26.264649 711557 usertrap_amd64.go:212] [ 1468(16978): 1468(16978)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:26.264763 711557 usertrap_amd64.go:122] [ 1468(16978): 1468(16978)] Allocate a new trap: 0xc176897e30 45 D0706 16:21:26.264831 711557 usertrap_amd64.go:225] [ 1468(16978): 1468(16978)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:26.485437 711557 usertrap_amd64.go:212] [ 1481(17834): 1481(17834)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:26.485559 711557 usertrap_amd64.go:122] [ 1481(17834): 1481(17834)] Allocate a new trap: 0xc00fc59da0 44 D0706 16:21:26.485652 711557 usertrap_amd64.go:225] [ 1481(17834): 1481(17834)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:26.491308 711557 task_exit.go:204] [ 1468(16978): 1468(16978)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.491628 711557 task_signals.go:204] [ 1468(16978): 1475(16980)] Signal 1468, PID: 1475, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.491688 711557 task_exit.go:204] [ 1468(16978): 1468(16978)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.491818 711557 task_exit.go:204] [ 1468(16978): 1475(16980)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.492017 711557 task_signals.go:204] [ 1468(16978): 1471(16979)] Signal 1468, PID: 1471, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.492107 711557 task_exit.go:204] [ 1468(16978): 1471(16979)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.492598 711557 task_exit.go:204] [ 1468(16978): 1475(16980)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.492699 711557 task_exit.go:204] [ 1468(16978): 1475(16980)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.495769 711557 task_exit.go:204] [ 1481(17834): 1481(17834)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.495893 711557 task_signals.go:204] [ 1481(17834): 1487(17836)] Signal 1481, PID: 1487, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.496009 711557 task_signals.go:204] [ 1481(17834): 1490(17837)] Signal 1481, PID: 1490, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.496230 711557 task_exit.go:204] [ 1481(17834): 1490(17837)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.496391 711557 task_signals.go:204] [ 1481(17834): 1486(17835)] Signal 1481, PID: 1486, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.496783 711557 task_exit.go:204] [ 1481(17834): 1481(17834)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.497010 711557 task_exit.go:204] [ 1481(17834): 1487(17836)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.497453 711557 task_exit.go:204] [ 1481(17834): 1486(17835)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.498305 711557 task_exit.go:204] [ 1481(17834): 1490(17837)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.498537 711557 task_exit.go:204] [ 1481(17834): 1490(17837)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.498794 711557 task_exit.go:204] [ 1481(17834): 1486(17835)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.498880 711557 task_exit.go:204] [ 1481(17834): 1486(17835)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.501336 711557 task_exit.go:204] [ 1468(16978): 1471(16979)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.501415 711557 task_exit.go:204] [ 1468(16978): 1471(16979)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.501510 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:26.501833 711557 usertrap_amd64.go:212] [ 1489(16360): 1489(16360)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:26.501907 711557 usertrap_amd64.go:122] [ 1489(16360): 1489(16360)] Allocate a new trap: 0xc00b3fa120 42 D0706 16:21:26.502015 711557 usertrap_amd64.go:225] [ 1489(16360): 1489(16360)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:26.502413 711557 task_exit.go:204] [ 1468(16978): 1468(16978)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:26 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) r3 = syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f0000001e00)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:26.507866 711557 task_exit.go:204] [ 1481(17834): 1487(17836)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.507975 711557 task_exit.go:204] [ 1481(17834): 1487(17836)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.508067 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:26.509012 711557 task_exit.go:204] [ 1481(17834): 1481(17834)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:26 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) setrlimit(0x4, &(0x7f00000000c0)={0xfffffffffffffffb, 0x1}) (async) dup(0xffffffffffffffff) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) ioctl$VT_RELDISP(r0, 0x5605) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x6000, 0x79dd2668b14e6dfa, 0x0) D0706 16:21:26.518596 711557 usertrap_amd64.go:212] [ 1489(16360): 1491(16361)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:26.518685 711557 usertrap_amd64.go:122] [ 1489(16360): 1491(16361)] Allocate a new trap: 0xc00b3fa120 43 D0706 16:21:26.518802 711557 usertrap_amd64.go:225] [ 1489(16360): 1491(16361)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:26.590628 711557 usertrap_amd64.go:212] [ 1489(16360): 1489(16360)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:26.590745 711557 usertrap_amd64.go:122] [ 1489(16360): 1489(16360)] Allocate a new trap: 0xc00b3fa120 44 D0706 16:21:26.590821 711557 usertrap_amd64.go:225] [ 1489(16360): 1489(16360)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:26.595961 711557 task_exit.go:204] [ 1489(16360): 1489(16360)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.596170 711557 task_exit.go:204] [ 1489(16360): 1489(16360)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.596345 711557 task_signals.go:204] [ 1489(16360): 1491(16361)] Signal 1489, PID: 1491, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:26.596423 711557 task_exit.go:204] [ 1489(16360): 1491(16361)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:26.598428 711557 usertrap_amd64.go:212] [ 1492(16981): 1492(16981)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:26.598570 711557 usertrap_amd64.go:122] [ 1492(16981): 1492(16981)] Allocate a new trap: 0xc0038ed7d0 40 D0706 16:21:26.599276 711557 usertrap_amd64.go:225] [ 1492(16981): 1492(16981)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:26.604100 711557 task_exit.go:204] [ 1489(16360): 1491(16361)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:26.604206 711557 task_exit.go:204] [ 1489(16360): 1491(16361)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.604314 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:26.604726 711557 task_exit.go:204] [ 1489(16360): 1489(16360)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:26.605352 711557 usertrap_amd64.go:212] [ 1492(16981): 1492(16981)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:26.605405 711557 usertrap_amd64.go:122] [ 1492(16981): 1492(16981)] Allocate a new trap: 0xc0038ed7d0 41 D0706 16:21:26.605502 711557 usertrap_amd64.go:225] [ 1492(16981): 1492(16981)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) 16:21:26 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x80800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080)={0x3b, 0x13, '\x00', [@generic={0x0, 0x14, "fbb26a1311213d1412cc301b5278c075fd1dbd93"}, @calipso={0x7, 0x20, {0x3, 0x6, 0x2, 0xb8, [0x7, 0x9, 0x1]}}, @generic={0x4, 0x5d, "b4c97742d8b0c8bb7a8b490a72ecfca059ae80ad1461904ad516fa099b35b86cfe23c352471f2b09a6ebbf5c5467cde74297064d968c031db89c5c5a5153c441073e80bf6a0e91d277dd36b6c40f29cba4af683d164a46cc8817be67a5"}, @pad1, @ra={0x5, 0x2, 0xc5}]}, 0xa8) (async) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@hopopts={0x2b, 0x1c, '\x00', [@generic={0x9, 0xdb, "6d4a7be381caae6306711dbf8abef0d0b69a95b4149de20edb696da0211746d1020d771125dec1631a664412ba617520d6ac67e1bf5362df245ca3730edfdcf3f116e1aa8fa5068b92b73df2b55a96c86e7a171f63b595968c2ed4b769fb734c367b5550df1ec967780d3793b15739374d75a8bd2405744f9850bbe4af148e05cee98a502722120990789e1f81be8eb6343b5a3c2176d669567ffa7bd960798ce4bcf2638bcad6af702a09833593e0274220888f2c59df41945b071b0865e4981e13eb1bafe5fc2f32e4f557d5628807394853fb8a251a84f06eb6"}, @jumbo={0xc2, 0x4, 0x7fff8000}]}, 0xf0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x4, 0xb4, 0x7, 0x7, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x8000, 0x7, 0xffffff4e}}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300)={@mcast1, r2}, 0x14) (async) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000007c0)={r5, r7, "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", "5f16a7928da80f7e77319a1f323660708a91fdc5d28038ab9fcdca1812f0df8bca26d7d4067c66374d4d839d1628f89bccde5d60c4c7564ea0c059dddd1700f078fc061063ab07ae65b663a5b3b8e204c06efe27fbf9fdba790075b7030152e0d1857dce9d44500d669a9589269fcd97439bc41cea4c8dd9b8427b9baff625c876ba0352b50e2dc5b3816d7652a2cdb3935c44b563378b4033ef58ef779be7ce3f5b9755b06b07060c75fc80789fd0be70044847508cce86d80ef8a7f9af3056938b9941d2a7f7032a0d779077e6cbec8b267099df5e4669c4e05b19d060578603635606c78a2df3d9f44df92a44a90789f588eee1519db824921691a02ca857b23885356df5f06a8f2aca870409c50f30b7a76fc609989a9863726b34368940e1fa6663d6c77778d768f48926a33c32b31f7fed7eb287b31ad616e7ca56ed92abf025f85f0142b40e10b491bb21d6f680c4b8ac126a12136ac3857f9fdf2fb9a0101fa9b340b60b313033413aeb576ad7ca98071ef3e70eebfd252bca8479f79a0c971df721cdea7d0089066dcbb7b8d313d279de0e23050a8fcdad4b1fcf8a598120f03d74f468b175a3c0f19c88bc387ff30dbc34817a7a83920bd571c2eac3fe375f99cf08ef8b9c54974dc8a912f96bb4c4b3a5f6eca6cbafa83321f7f19d5f63650498020a67d41563a59883a9b9757ba4fae27cf40a5d3db9e5f25dd7ed493ddb73142e218bb107d65340e3aa2031b78a4c2f10a58593f2a9c774771b8a82a2b53a50e94c96112c0bc4ef96bb8b8bad4d6140204011802679559c312b6e5b4eb47173da7682c70d425168b471b77a053c49f9d470276c62b7a502d3360d2857455421e9894504e3b7b5ff4fb94a9dd6f229ebeb55d8fc49453219772290af9e9e83842a355b6e9a3b53c22046d5f86c5ce54e706dabd6de661d6ebc2fb4da233525e5bd88bc6d3481652d2390f858a91bea3b2e6d69262ca7c2437c5a41b54e90510d41e7140f0db8aaa3080685871a22ab27a9c0310638038e739120cdfdbe6ad2e06aaa6e1341014b01d48a4ee115c69d90d935f9bfc38dfe8c67c20450cb2c0f01e9886a06deb558b5b1cedb35918e68419a062f8359018684967636ba73893243323ab3fc246a9092600242fb1b821381b9ae2cf22afc6b1b769a1fe19175d88e33fa345e7950befea3bb20f74930060f2cff089959ae6efac066a93db073313964639af2f366c06a1204edb4981d4eedbc81edb86f17ee3f4030b3b101adb9a064c2becc8570e86e4c2a41109c1d510b38450b715664924054cc37faf0cc5e27027e7e60689988f4643df46d8635a037f9274c41ecd46194e6c4a118015c5ba046609e9c6866921aad5424dabc6d84391b2de43a3bd73c249aa3131da51244781226c1ba0ca5cf452b64339f769c79f6e674393bc08d211b8b2e0c6ed2533b91f88aab9d80b42987499f41f75e8861917c630cfc11b4261b9f75cc12952b5d713025a3841ba7c9309790e2eb7e262e2930d80663a5578b8784fe62a561201a168b21824255cf94eec42f0f9a868b5754833d5871185e431cd591045ed3bc443430b7b01070adee51a5e09861c7fda242dfe9f78d9bbadb37869c869069d26d383a529219c3330785faccbb61ff62eddae07543e546db0c1a99ba8590c40e912b81bb0c19b3a7cd46b20c473c373ac632982aeae0170e9c5c2a71654bb2db5789c03f2c2ff8a1d3b14e3061780a2b4847f61e5ce8e19a800a3c3e03c27840f1af6e769b7f768e995d6b709c7f798b60b4e6bdfd9f212a138b75e03f56d59b82367fa2e16ebd26ba44ab8486b689bc8e6aff61b1d84443f8a6e18b549088b095a378917319b4bc582f2124fde73540520731622bdb87a91b5a50648da055510799d39eec4765f0595f12d2df786cfeb0f34c85e146cf545cfbb1c980dac7968d41dded4437267014f4eab1c796ec3bfedf3b603a0a11f63185c8db9b0ceaf940d47d93e61bf72c4d3c3ac898a2127d5427e76644bc152f4f7d1f19ad4dd7d7f121d415d4bd3505daafd5bab1cfc0cb1dbd2b8a5565c722a28dad5c4af8af69732a96331ddd47d779af611826fe6801c9140badf79b47e7e014e102e26325c4ccad0ab5ebe258ca09cc357d4ea0e0ca4b2af47ae8f2e308cfee2aa26b8c4cd7b36332641d6639aa1f78c9694dc68c75d27c5ecbe3ce421ebaa1094d9d8813e55dd4cb9dfd193fd75da6fa056510fd0de9b0d05dcbaef1f1e1f2d33441a2fa79b9642df31d388156ee47bf8303043dcf47ed0d0ddaacd5860be58d1e41b1cba890a87df82261faf9dba59af3c1de62282709a4e9ea56eb4d8bb369b7c45cc14aad2f04dee555b2da26c915aac61a32192270ac83f68b7382b3d23a9d6ef9c22d93df4869a9998ca91e13ad2fb434d92f2c745f2c86ec1b7921af41da18848c04ff4e74dc9ac512b573476e46bd11f551ac53148dc0b898230fff4be7a890d1d53903669ec6bacf4e6cdbe09d64e1c5139ead224d9a32bd64e4a287ba0d13ae71f6cce601939b99b04f82fb71dfa2c6130a4c8e1d453574d6074aea2eb400a1e4ff93bb8afbdc7016cf09d16ac6a8b35b2c54f32786dfb4c0e199e4fec8de51efbc58276cdc413d8b4f4c636fb4bb2e5b2d9f212a923e6395e26327fed9d89fc005c78fef7c97d28fcbb76914d5ca6e59138f092fd067a4f3a0bc31ef83498ef8cb9f9a18039e12437dadd8669ff99c1351df9130ba6cfecd35762da34b1c6c3ab2f60e98cb5b7ccce1c6a41a15daf87220e06429af79eee8a5cfdd2d0a7cca66700961a363ad5c2f6d0c61087005c08ae33aafafe6abbb443b3c220952a80b352629e6fba9b7e5e56049c8e48abb0d25fd216aab5bdce91ecc8cf58eea3bb9b63472c2f70ad0379714ba5c398acedecc2f21563b675abe3c3efcdf45698e0c3a3ea07fabfa8d0cee856862112d1d016bf80b40b22643c3512bb10bb4cdeb6c7f093709df0adea9bd8d1617339ea8a89c1ab1d20f5ec0490d7979efcefc0193e2bf60043f90cce9820dabcd75c5664e723c649273bebfb68d30d405069ce8b0cb2ede2d0749103f02999ac29600815678a99cfc65c6f590f43651e21a09997356777fd2af693bc3ed15f5f931a789ebb328c003e945a0e188b16fe5e5cce082881b9ed8878baa73c98d40c39e0c6da5f17015f34bf94ffbe8e3d7c32564324f6dbae81994059986e20d51e6e92485c12ea6d2acdd871c3999b79ae736dd4ce8a105458a1345e78608327abba9c2c46ae62a949f48e326495947559575be16d2de1ba4fdf1017a103283ac429c575ee0b88e522e3f6493b01bedd1500ba1fef33b6e5faa076df591302c0b4f6f9593fe0b2c2b85a411c7428d6015d125474d1a9e6800b265abf870998f75eace71c2149d2e4e7d4a7405a2f1ccf8da8175674a4d05f8ee8e502ed58697023ecbaf5044dc1f2106b3e6fdd1209c7e998a75517013d0d008d9a70480df419ac096d538f5a0f699a965eeccd0a6513cf4d3094749f17bb8b07f801830ac401b84bab03a3a951725cda8ef309d1386be2f46e89b6570910b2df6ea0c937895bb3e631e0145a14c4c19d3010367bb583bf4320590bf7425b56b773803e91b5f5cb5fc11d5bf0981696f3a8d33cf2bd70fa8c6268c2adaef8c3703f54056b765a85e067a7fa0b619cb53e39cbcbe4c6ea6b69545629406e1754ed7f649781065b6b5dac7af24f05cd90a05e357145ebc22993aab4f49337eee239074495e5648bc4e5bf3251949bfbf3c19c06934ae956fba545c7dfd523eadf978d781f328592f09089f76d2435946aa14d1137f0138a2b70cb61bcf4d14290010918fbb5e37b3b137331ded8ac4a2e06699f011fa583068bc97691ab401fbd93a31d74ede521eb2b93a57b986550d2b6e3e37a66180452221a260056874452c17b92e3237ae48552fc83e130f0c8e70f4eb7a01cac977d548fc9158bd201ffb820fc5f17cb0526c9bbbf044e835289eb117198c9b8b444281dd945edaa759f1fae500fd5d6c9aaeb533cb7d9af0e3d83152f028398f29cdc238c9ed5b9e3260587d239ecc9d558fda1a07913bd98e52d5f430e330ab4ded9326af502935e7ed50ed695f46d978cb5cfe153574c71d3706b6bea2a6abdd310d71c60435edbcb13d94d19bb75bd80b11b33d368ba56ced5e0b879de1f9a93baa0692b241a2034e18096344ac0c87124d9fb526fc7999cd12d7d31d1b7308d9f8844dbc568b77088c5e0a8aa16f43fed97fac0749037f454e3fd4c81bd62ca0272085a5bf7e439b7b9d14bd3d63bf10d171e63d258a7af812148a4eceb547d3ca803851e4e0156717f86c5942648a0eab80f2324e57ca84e94ee06c43b9a42676e205e2bfa0e5a81fc948c6ccb710fef3bc172975ff7502e02a8213831c9ce19650993b0fa51ddac33ee669bef5ce8cebc47d6b3aa7b706625ce4def7089187956ada7bb6f044058ad9de4b428d6049ff69e6b9d293a5217a83bc953756813ef1e928f02500ff212d470d76084e09e3ac8c127d1d0041a04dfa521d095d116e517448441801f343e3a884970398ae84025a2b820e1aad08316f1ec101cfa6c1be9ce9e9a4eb9c29415b362a65d8c264cd1e9e967b15c791c8f692b91f1029975b577dfe45f6fcf71ccf33fc224ae0353f9ef2c8fe0529586c8f1d16f5e01bccc7ed4133524e8a8a89a2d0e88682677e06e86ec31686c07b00080966b272cc47a6149ba733493005b6c19cbebe616b5e60ce9c8c37cccb54e7566fa94612d931a154c27f9eba2c8dbb0e5db9c1cc71cba9d564a8489d1611c53d3fb03336ca16897d1c3b8c59a23916274e608f4a752d4386aec2b0df8ef61da46579d787cfe22693c7c0612b84a0077a811a01d2053672bc66c3e008d931741e704605311bcc1b767a6d1b4f609a1d71991fba5eedeb885805831da653c837138bb443508542abb2aa55b8f507fdf59bce659a799a03bfd4d25db1c222a3e000fedcd6420ad0d69422d38438c605259a914a14f81c3a4b988d09a4b1e35b03a46d14f6cc858b3cd150346a02534161d0d3c9227df3686c7d133daceb1b9d625dc0eb5c8e5b5f0354a4c44e8d8e4cda0a92abd5f570a5c6521be5aab28f7f458b8ab895eb02937ee5735b0b7b6847f1fc14ad0d0623aaa28791e70918b33ea1465d2b6e08a03c4ce22748885e042e0932978114bd4476977baf6a9256dd8c88f694911a3470eb1049686e629688aebf656a3230e786c39e3dbd3cc0d62e65ca898e05369eb39b870cf87669fee29c6f5a872e3cd3bd079199e1b415d356c2f7024f90284ce6825563d4bc7462acdda1155fce42a39a84ab916b7de85d178281b23105bc1cb88cece8c4f75eb0e44feaed76062be026b65d"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000017c0)='net/udplite\x00') (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001800)={0x9, [{r6, r5}, {r3}, {r3, r5}, {r7}, {0x0, r5}, {r3, r8}, {r6, r8}, {r3, r8}, {r6, r9}, {r4, r8}, {0x0, r8}, {r4, r8}, {r7, r5}, {r6, r9}, {r3, r9}, {r10, r5}, {r4, r5}, {}, {r7, r5}, {r4, r5}, {r7, r8}, {r6, r8}, {r7, r8}, {r4, r5}, {r3, r5}, {r4, r8}, {r6, r9}, {r6}, {r10, r9}, {r6, r5}, {r7}, {r4}, {r3, r8}, {r7, r9}, {0x0, r8}, {r3, r8}, {r7, r9}, {r10, r9}, {r6, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {0x0, r9}, {r3, r8}, {0x0, r8}, {r10, r8}, {r7, r5}, {r7, r5}, {r4, r9}, {r3, r8}, {r3}, {r3, r8}, {r7, r8}, {r7, r9}, {r3, r5}, {r4, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r7, r9}, {r10}, {r3, r8}, {r10}, {r4}, {r7, r9}, {r3, r5}, {r6, r8}, {r6, r5}, {0x0, r5}, {r6, r9}, {r4, r5}, {r7, r5}, {r6, r8}, {r6, r5}, {r6}, {r3, r8}, {r6}, {r7, r5}, {r3, r9}, {r4, r8}, {0x0, r5}, {r7, r5}, {r4, r9}, {r10, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r4, r9}, {r10, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {r6, r9}, {r3, r5}, {r10, r8}, {r7, r8}, {r10, r8}, {}, {r6, r8}, {r3, r8}, {r4, r5}, {r3, r8}, {r7, r5}, {r4, r5}, {0x0, r5}, {r7, r5}, {r4, r5}, {r7, r5}, {0x0, r8}, {r10, r5}, {r3, r5}, {r6, r5}, {r4}, {r7, r5}, {r7, r8}, {r4, r9}, {r10, r9}, {r3, r9}, {0x0, r9}, {0x0, r8}, {r4, r8}, {r10, r5}, {0x0, r5}, {r3, r9}, {r4, r8}, {r3}, {r7, r9}, {r7, r8}, {r6, r5}, {r6, r9}, {r6, r8}, {r7, r5}, {r10, r5}, {r6, r5}, {r10}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r4}, {r6, r8}, {r4, r8}, {r7, r5}, {r3, r8}, {r7, r8}, {r10}, {r3, r9}, {r7, r9}, {r10, r8}, {r6, r5}, {0x0, r8}, {0x0, r9}, {r4, r9}, {0x0, r9}, {r3, r5}, {r3, r9}, {r7, r5}, {r6, r8}, {r6, r8}, {r10, r8}, {r10, r5}, {}, {r6, r9}, {r3}, {r3}, {0x0, r9}, {r4, r8}, {r10}, {r4, r9}, {r6, r5}, {r3, r8}, {r6}, {r6, r9}, {r6, r8}, {r3, r5}, {r6, r5}, {0x0, r5}, {r4, r8}, {r4}, {0x0, r5}, {r4, r8}, {r10}, {r4, r5}, {r6, r8}, {r6, r9}, {r3, r8}, {r7, r5}, {r4, r8}, {0x0, r8}, {0x0, r8}, {r3}, {r4, r5}, {r6, r5}, {r10, r5}, {r3, r5}, {r10, r9}, {r6, r8}, {r3, r8}, {r7, r5}, {0x0, r9}, {r7, r8}, {r10, r5}, {0x0, r5}, {r3, r8}, {r4}, {r10, r9}, {r7, r8}, {r4, r5}, {r6, r5}, {r3, r5}, {r4, r9}, {r6, r8}, {r3}, {r3}, {r3}, {r3, r8}, {r3, r8}, {r6, r8}, {r6, r8}, {r4, r5}, {r10, r8}, {r6, r9}, {r6, r5}, {0x0, r9}, {r3, r9}, {r3, r5}, {r10, r9}, {r10}, {0x0, r9}, {r7, r8}, {r7, r8}, {r3, r9}, {0x0, r9}, {r6, r8}, {r7, r8}, {r6, r9}, {r6, r9}, {r7, r9}, {r10, r5}, {r10, r5}, {r3, r5}, {r10, r8}, {r10, r5}, {r7, r5}, {r6}, {}, {r6, r5}, {r3}, {0x0, r9}, {r4}, {r7, r9}, {r7, r9}, {r3, r8}, {r3, r9}], 0x7, "a2eeb4b849d8ac"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000002800)={{r12, 0x9, 0x7fffffff, 0xffffffffffffffff, 0x100000000, 0x6, 0x80000001, 0x1, 0x3000000, 0x2ad1, 0x3ff, 0x1000, 0x20, 0xfc0000, 0x5}}) (async) setsockopt$inet6_icmp_ICMP_FILTER(r11, 0x1, 0x1, &(0x7f0000003800)={0x8000}, 0x4) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000003840)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r11, 0x5000943f, &(0x7f0000003a40)={{r1}, r14, 0x1e, @unused=[0x3, 0x2, 0x7, 0x200], @subvolid=0x43}) (async) r15 = ioctl$TIOCGPTPEER(r11, 0x5441, 0x30) r16 = socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000004a40)={r13, 0xfffffffffffff5c3}) (async) ioctl$PIO_CMAP(r15, 0x4b71, &(0x7f0000005a40)={0x80, 0xffff, 0x9, 0xc0c, 0x9, 0x1}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFSUUID(r17, 0x4008662c, &(0x7f0000005ac0)={0x0, 0x0, "c303484699c15c7d0b53b32f281c6331"}) (async) ioctl$TIOCSWINSZ(r11, 0x5414, &(0x7f0000005b00)={0x1, 0xc9, 0x99, 0x9}) write$P9_RSTATFS(r11, &(0x7f0000005b40)={0x43, 0x9, 0x2, {0xff, 0x547, 0x400, 0x2, 0x100000001, 0x30, 0x5, 0x24, 0x81}}, 0x43) (async) r19 = dup2(r16, r18) write$P9_RSTAT(r19, &(0x7f0000005bc0)={0x4a, 0x7d, 0x1, {0x0, 0x43, 0x4a00, 0x80, {0x1, 0x1, 0x2}, 0x8810000, 0xb7, 0xffffff81, 0x6, 0x6, 'icmp6\x00', 0x1, '\x00', 0x6, 'icmp6\x00', 0x3, ',/)'}}, 0x4a) write$P9_RUNLINKAT(r19, &(0x7f0000005c40)={0x7, 0x4d, 0x2}, 0x7) (async) ioctl$EXT4_IOC_SETFSUUID(0xffffffffffffffff, 0x4008662c, &(0x7f0000005c80)={0x10, 0x0, "2f512a602c090b52c32f31230b338e3f"}) (async) r20 = getpgrp(0x0) fcntl$lock(r0, 0x7, &(0x7f0000005cc0)={0x2, 0x0, 0xffffffffffffffff, 0x6, r20}) D0706 16:21:26.607737 711557 usertrap_amd64.go:212] [ 1493(17838): 1493(17838)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:26.607873 711557 usertrap_amd64.go:122] [ 1493(17838): 1493(17838)] Allocate a new trap: 0xc00c211050 40 D0706 16:21:26.608838 711557 usertrap_amd64.go:225] [ 1493(17838): 1493(17838)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:26.613410 711557 usertrap_amd64.go:212] [ 1493(17838): 1493(17838)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:26.613495 711557 usertrap_amd64.go:122] [ 1493(17838): 1493(17838)] Allocate a new trap: 0xc00c211050 41 D0706 16:21:26.613602 711557 usertrap_amd64.go:225] [ 1493(17838): 1493(17838)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:26.638800 711557 usertrap_amd64.go:212] [ 1492(16981): 1492(16981)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:26.638863 711557 usertrap_amd64.go:122] [ 1492(16981): 1492(16981)] Allocate a new trap: 0xc0038ed7d0 42 D0706 16:21:26.638917 711557 usertrap_amd64.go:225] [ 1492(16981): 1492(16981)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:26.643783 711557 usertrap_amd64.go:212] [ 1493(17838): 1493(17838)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:26.643890 711557 usertrap_amd64.go:122] [ 1493(17838): 1493(17838)] Allocate a new trap: 0xc00c211050 42 D0706 16:21:26.644035 711557 usertrap_amd64.go:225] [ 1493(17838): 1493(17838)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:26.669601 711557 usertrap_amd64.go:212] [ 1492(16981): 1495(16982)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:26.669687 711557 usertrap_amd64.go:122] [ 1492(16981): 1495(16982)] Allocate a new trap: 0xc0038ed7d0 43 D0706 16:21:26.669895 711557 usertrap_amd64.go:225] [ 1492(16981): 1495(16982)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:26.679663 711557 usertrap_amd64.go:212] [ 1494(16362): 1494(16362)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:26.679815 711557 usertrap_amd64.go:122] [ 1494(16362): 1494(16362)] Allocate a new trap: 0xc00fc59e30 40 D0706 16:21:26.680652 711557 usertrap_amd64.go:225] [ 1494(16362): 1494(16362)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:26.684750 711557 usertrap_amd64.go:212] [ 1494(16362): 1494(16362)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:26.684823 711557 usertrap_amd64.go:122] [ 1494(16362): 1494(16362)] Allocate a new trap: 0xc00fc59e30 41 D0706 16:21:26.684890 711557 usertrap_amd64.go:225] [ 1494(16362): 1494(16362)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:27.107915 711557 usertrap_amd64.go:212] [ 1480(15742): 1480(15742)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:27.108298 711557 usertrap_amd64.go:122] [ 1480(15742): 1480(15742)] Allocate a new trap: 0xc0089189f0 45 D0706 16:21:27.108446 711557 usertrap_amd64.go:225] [ 1480(15742): 1480(15742)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:27.109154 711557 usertrap_amd64.go:212] [ 1493(17838): 1493(17838)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:27.109352 711557 usertrap_amd64.go:122] [ 1493(17838): 1493(17838)] Allocate a new trap: 0xc00c211050 43 D0706 16:21:27.109502 711557 usertrap_amd64.go:225] [ 1493(17838): 1493(17838)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:27.111525 711557 usertrap_amd64.go:212] [ 1493(17838): 1493(17838)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:27.111609 711557 usertrap_amd64.go:122] [ 1493(17838): 1493(17838)] Allocate a new trap: 0xc00c211050 44 D0706 16:21:27.111687 711557 usertrap_amd64.go:225] [ 1493(17838): 1493(17838)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:27.119745 711557 usertrap_amd64.go:212] [ 1492(16981): 1492(16981)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:27.119868 711557 usertrap_amd64.go:122] [ 1492(16981): 1492(16981)] Allocate a new trap: 0xc0038ed7d0 44 D0706 16:21:27.119933 711557 usertrap_amd64.go:225] [ 1492(16981): 1492(16981)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:27.121369 711557 task_exit.go:204] [ 1493(17838): 1493(17838)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.121766 711557 task_signals.go:204] [ 1493(17838): 1496(17839)] Signal 1493, PID: 1496, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.121853 711557 task_signals.go:204] [ 1493(17838): 1498(17841)] Signal 1493, PID: 1498, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.122056 711557 task_signals.go:204] [ 1493(17838): 1497(17840)] Signal 1493, PID: 1497, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.122146 711557 task_exit.go:204] [ 1493(17838): 1493(17838)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.122288 711557 task_exit.go:204] [ 1493(17838): 1498(17841)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.122666 711557 task_exit.go:204] [ 1493(17838): 1497(17840)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.122937 711557 task_exit.go:204] [ 1493(17838): 1497(17840)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.122992 711557 task_exit.go:204] [ 1493(17838): 1497(17840)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.123175 711557 task_exit.go:204] [ 1493(17838): 1496(17839)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.124265 711557 task_exit.go:204] [ 1493(17838): 1498(17841)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.124356 711557 task_exit.go:204] [ 1493(17838): 1498(17841)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.125071 711557 task_exit.go:204] [ 1480(15742): 1480(15742)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.125417 711557 task_exit.go:204] [ 1480(15742): 1480(15742)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.125769 711557 task_signals.go:204] [ 1480(15742): 1482(15743)] Signal 1480, PID: 1482, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.125898 711557 task_exit.go:204] [ 1480(15742): 1482(15743)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.126169 711557 task_exit.go:204] [ 1480(15742): 1482(15743)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.126228 711557 task_exit.go:204] [ 1480(15742): 1482(15743)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.126602 711557 task_signals.go:204] [ 1480(15742): 1488(15744)] Signal 1480, PID: 1488, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.126807 711557 task_exit.go:204] [ 1480(15742): 1488(15744)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.134755 711557 task_exit.go:204] [ 1493(17838): 1496(17839)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.134841 711557 task_exit.go:204] [ 1493(17838): 1496(17839)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.135067 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:27.135353 711557 task_exit.go:204] [ 1493(17838): 1493(17838)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x9, 0xd8) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:27.140325 711557 task_exit.go:204] [ 1480(15742): 1488(15744)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.140435 711557 task_exit.go:204] [ 1480(15742): 1488(15744)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.140664 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:27.140873 711557 task_exit.go:204] [ 1480(15742): 1480(15742)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:27.208853 711557 usertrap_amd64.go:212] [ 1494(16362): 1494(16362)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:27.209026 711557 usertrap_amd64.go:122] [ 1494(16362): 1494(16362)] Allocate a new trap: 0xc00fc59e30 42 D0706 16:21:27.209123 711557 usertrap_amd64.go:225] [ 1494(16362): 1494(16362)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:27.229932 711557 usertrap_amd64.go:212] [ 1494(16362): 1500(16363)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:27.230085 711557 usertrap_amd64.go:122] [ 1494(16362): 1500(16363)] Allocate a new trap: 0xc00fc59e30 43 D0706 16:21:27.230174 711557 usertrap_amd64.go:225] [ 1494(16362): 1500(16363)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:27.239714 711557 usertrap_amd64.go:212] [ 1501(17842): 1501(17842)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:27.239958 711557 usertrap_amd64.go:122] [ 1501(17842): 1501(17842)] Allocate a new trap: 0xc173599140 40 D0706 16:21:27.240899 711557 usertrap_amd64.go:225] [ 1501(17842): 1501(17842)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:27.247911 711557 usertrap_amd64.go:212] [ 1501(17842): 1501(17842)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:27.248210 711557 usertrap_amd64.go:122] [ 1501(17842): 1501(17842)] Allocate a new trap: 0xc173599140 41 D0706 16:21:27.248389 711557 usertrap_amd64.go:225] [ 1501(17842): 1501(17842)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:27.251350 711557 usertrap_amd64.go:212] [ 1494(16362): 1494(16362)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:27.251453 711557 usertrap_amd64.go:122] [ 1494(16362): 1494(16362)] Allocate a new trap: 0xc00fc59e30 44 D0706 16:21:27.251539 711557 usertrap_amd64.go:225] [ 1494(16362): 1494(16362)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:27.254247 711557 task_exit.go:204] [ 1494(16362): 1494(16362)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.254515 711557 task_signals.go:204] [ 1494(16362): 1504(16365)] Signal 1494, PID: 1504, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.254538 711557 task_signals.go:204] [ 1494(16362): 1505(16366)] Signal 1494, PID: 1505, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.254595 711557 task_exit.go:204] [ 1494(16362): 1494(16362)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.254889 711557 task_signals.go:204] [ 1494(16362): 1502(16364)] Signal 1494, PID: 1502, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.255046 711557 task_signals.go:204] [ 1494(16362): 1500(16363)] Signal 1494, PID: 1500, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.255280 711557 task_exit.go:204] [ 1494(16362): 1505(16366)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.255535 711557 task_exit.go:204] [ 1494(16362): 1502(16364)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.255811 711557 task_exit.go:204] [ 1494(16362): 1504(16365)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.256257 711557 task_exit.go:204] [ 1494(16362): 1500(16363)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.256593 711557 task_exit.go:204] [ 1494(16362): 1500(16363)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.256677 711557 task_exit.go:204] [ 1494(16362): 1500(16363)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.257104 711557 task_exit.go:204] [ 1494(16362): 1502(16364)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.257155 711557 task_exit.go:204] [ 1494(16362): 1502(16364)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.257390 711557 task_exit.go:204] [ 1494(16362): 1505(16366)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.257489 711557 task_exit.go:204] [ 1494(16362): 1505(16366)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.269499 711557 usertrap_amd64.go:212] [ 1503(15745): 1503(15745)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:27.269620 711557 task_exit.go:204] [ 1494(16362): 1504(16365)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.269702 711557 usertrap_amd64.go:122] [ 1503(15745): 1503(15745)] Allocate a new trap: 0xc0038ed800 40 D0706 16:21:27.269709 711557 task_exit.go:204] [ 1494(16362): 1504(16365)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.269956 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:27.270582 711557 task_exit.go:204] [ 1494(16362): 1494(16362)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.270696 711557 usertrap_amd64.go:225] [ 1503(15745): 1503(15745)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:27.272187 711557 usertrap_amd64.go:212] [ 1501(17842): 1501(17842)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:27.272274 711557 usertrap_amd64.go:122] [ 1501(17842): 1501(17842)] Allocate a new trap: 0xc173599140 42 D0706 16:21:27.272372 711557 usertrap_amd64.go:225] [ 1501(17842): 1501(17842)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) 16:21:27 executing program 1: accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x80800) (async) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x80800) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080)={0x3b, 0x13, '\x00', [@generic={0x0, 0x14, "fbb26a1311213d1412cc301b5278c075fd1dbd93"}, @calipso={0x7, 0x20, {0x3, 0x6, 0x2, 0xb8, [0x7, 0x9, 0x1]}}, @generic={0x4, 0x5d, "b4c97742d8b0c8bb7a8b490a72ecfca059ae80ad1461904ad516fa099b35b86cfe23c352471f2b09a6ebbf5c5467cde74297064d968c031db89c5c5a5153c441073e80bf6a0e91d277dd36b6c40f29cba4af683d164a46cc8817be67a5"}, @pad1, @ra={0x5, 0x2, 0xc5}]}, 0xa8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@hopopts={0x2b, 0x1c, '\x00', [@generic={0x9, 0xdb, "6d4a7be381caae6306711dbf8abef0d0b69a95b4149de20edb696da0211746d1020d771125dec1631a664412ba617520d6ac67e1bf5362df245ca3730edfdcf3f116e1aa8fa5068b92b73df2b55a96c86e7a171f63b595968c2ed4b769fb734c367b5550df1ec967780d3793b15739374d75a8bd2405744f9850bbe4af148e05cee98a502722120990789e1f81be8eb6343b5a3c2176d669567ffa7bd960798ce4bcf2638bcad6af702a09833593e0274220888f2c59df41945b071b0865e4981e13eb1bafe5fc2f32e4f557d5628807394853fb8a251a84f06eb6"}, @jumbo={0xc2, 0x4, 0x7fff8000}]}, 0xf0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x4, 0xb4, 0x7, 0x7, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x8000, 0x7, 0xffffff4e}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x4, 0xb4, 0x7, 0x7, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x8000, 0x7, 0xffffff4e}}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300)={@mcast1, r2}, 0x14) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) (async) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000007c0)={r5, r7, "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", "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"}) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000017c0)='net/udplite\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001800)={0x9, [{r6, r5}, {r3}, {r3, r5}, {r7}, {0x0, r5}, {r3, r8}, {r6, r8}, {r3, r8}, {r6, r9}, {r4, r8}, {0x0, r8}, {r4, r8}, {r7, r5}, {r6, r9}, {r3, r9}, {r10, r5}, {r4, r5}, {}, {r7, r5}, {r4, r5}, {r7, r8}, {r6, r8}, {r7, r8}, {r4, r5}, {r3, r5}, {r4, r8}, {r6, r9}, {r6}, {r10, r9}, {r6, r5}, {r7}, {r4}, {r3, r8}, {r7, r9}, {0x0, r8}, {r3, r8}, {r7, r9}, {r10, r9}, {r6, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {0x0, r9}, {r3, r8}, {0x0, r8}, {r10, r8}, {r7, r5}, {r7, r5}, {r4, r9}, {r3, r8}, {r3}, {r3, r8}, {r7, r8}, {r7, r9}, {r3, r5}, {r4, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r7, r9}, {r10}, {r3, r8}, {r10}, {r4}, {r7, r9}, {r3, r5}, {r6, r8}, {r6, r5}, {0x0, r5}, {r6, r9}, {r4, r5}, {r7, r5}, {r6, r8}, {r6, r5}, {r6}, {r3, r8}, {r6}, {r7, r5}, {r3, r9}, {r4, r8}, {0x0, r5}, {r7, r5}, {r4, r9}, {r10, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r4, r9}, {r10, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {r6, r9}, {r3, r5}, {r10, r8}, {r7, r8}, {r10, r8}, {}, {r6, r8}, {r3, r8}, {r4, r5}, {r3, r8}, {r7, r5}, {r4, r5}, {0x0, r5}, {r7, r5}, {r4, r5}, {r7, r5}, {0x0, r8}, {r10, r5}, {r3, r5}, {r6, r5}, {r4}, {r7, r5}, {r7, r8}, {r4, r9}, {r10, r9}, {r3, r9}, {0x0, r9}, {0x0, r8}, {r4, r8}, {r10, r5}, {0x0, r5}, {r3, r9}, {r4, r8}, {r3}, {r7, r9}, {r7, r8}, {r6, r5}, {r6, r9}, {r6, r8}, {r7, r5}, {r10, r5}, {r6, r5}, {r10}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r4}, {r6, r8}, {r4, r8}, {r7, r5}, {r3, r8}, {r7, r8}, {r10}, {r3, r9}, {r7, r9}, {r10, r8}, {r6, r5}, {0x0, r8}, {0x0, r9}, {r4, r9}, {0x0, r9}, {r3, r5}, {r3, r9}, {r7, r5}, {r6, r8}, {r6, r8}, {r10, r8}, {r10, r5}, {}, {r6, r9}, {r3}, {r3}, {0x0, r9}, {r4, r8}, {r10}, {r4, r9}, {r6, r5}, {r3, r8}, {r6}, {r6, r9}, {r6, r8}, {r3, r5}, {r6, r5}, {0x0, r5}, {r4, r8}, {r4}, {0x0, r5}, {r4, r8}, {r10}, {r4, r5}, {r6, r8}, {r6, r9}, {r3, r8}, {r7, r5}, {r4, r8}, {0x0, r8}, {0x0, r8}, {r3}, {r4, r5}, {r6, r5}, {r10, r5}, {r3, r5}, {r10, r9}, {r6, r8}, {r3, r8}, {r7, r5}, {0x0, r9}, {r7, r8}, {r10, r5}, {0x0, r5}, {r3, r8}, {r4}, {r10, r9}, {r7, r8}, {r4, r5}, {r6, r5}, {r3, r5}, {r4, r9}, {r6, r8}, {r3}, {r3}, {r3}, {r3, r8}, {r3, r8}, {r6, r8}, {r6, r8}, {r4, r5}, {r10, r8}, {r6, r9}, {r6, r5}, {0x0, r9}, {r3, r9}, {r3, r5}, {r10, r9}, {r10}, {0x0, r9}, {r7, r8}, {r7, r8}, {r3, r9}, {0x0, r9}, {r6, r8}, {r7, r8}, {r6, r9}, {r6, r9}, {r7, r9}, {r10, r5}, {r10, r5}, {r3, r5}, {r10, r8}, {r10, r5}, {r7, r5}, {r6}, {}, {r6, r5}, {r3}, {0x0, r9}, {r4}, {r7, r9}, {r7, r9}, {r3, r8}, {r3, r9}], 0x7, "a2eeb4b849d8ac"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001800)={0x9, [{r6, r5}, {r3}, {r3, r5}, {r7}, {0x0, r5}, {r3, r8}, {r6, r8}, {r3, r8}, {r6, r9}, {r4, r8}, {0x0, r8}, {r4, r8}, {r7, r5}, {r6, r9}, {r3, r9}, {r10, r5}, {r4, r5}, {}, {r7, r5}, {r4, r5}, {r7, r8}, {r6, r8}, {r7, r8}, {r4, r5}, {r3, r5}, {r4, r8}, {r6, r9}, {r6}, {r10, r9}, {r6, r5}, {r7}, {r4}, {r3, r8}, {r7, r9}, {0x0, r8}, {r3, r8}, {r7, r9}, {r10, r9}, {r6, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {0x0, r9}, {r3, r8}, {0x0, r8}, {r10, r8}, {r7, r5}, {r7, r5}, {r4, r9}, {r3, r8}, {r3}, {r3, r8}, {r7, r8}, {r7, r9}, {r3, r5}, {r4, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r7, r9}, {r10}, {r3, r8}, {r10}, {r4}, {r7, r9}, {r3, r5}, {r6, r8}, {r6, r5}, {0x0, r5}, {r6, r9}, {r4, r5}, {r7, r5}, {r6, r8}, {r6, r5}, {r6}, {r3, r8}, {r6}, {r7, r5}, {r3, r9}, {r4, r8}, {0x0, r5}, {r7, r5}, {r4, r9}, {r10, r8}, {r7, r5}, {r6, r5}, {r7, r8}, {r4, r9}, {r10, r5}, {r10, r5}, {r7, r8}, {r3, r9}, {r6, r9}, {r3, r5}, {r10, r8}, {r7, r8}, {r10, r8}, {}, {r6, r8}, {r3, r8}, {r4, r5}, {r3, r8}, {r7, r5}, {r4, r5}, {0x0, r5}, {r7, r5}, {r4, r5}, {r7, r5}, {0x0, r8}, {r10, r5}, {r3, r5}, {r6, r5}, {r4}, {r7, r5}, {r7, r8}, {r4, r9}, {r10, r9}, {r3, r9}, {0x0, r9}, {0x0, r8}, {r4, r8}, {r10, r5}, {0x0, r5}, {r3, r9}, {r4, r8}, {r3}, {r7, r9}, {r7, r8}, {r6, r5}, {r6, r9}, {r6, r8}, {r7, r5}, {r10, r5}, {r6, r5}, {r10}, {r6, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r4}, {r6, r8}, {r4, r8}, {r7, r5}, {r3, r8}, {r7, r8}, {r10}, {r3, r9}, {r7, r9}, {r10, r8}, {r6, r5}, {0x0, r8}, {0x0, r9}, {r4, r9}, {0x0, r9}, {r3, r5}, {r3, r9}, {r7, r5}, {r6, r8}, {r6, r8}, {r10, r8}, {r10, r5}, {}, {r6, r9}, {r3}, {r3}, {0x0, r9}, {r4, r8}, {r10}, {r4, r9}, {r6, r5}, {r3, r8}, {r6}, {r6, r9}, {r6, r8}, {r3, r5}, {r6, r5}, {0x0, r5}, {r4, r8}, {r4}, {0x0, r5}, {r4, r8}, {r10}, {r4, r5}, {r6, r8}, {r6, r9}, {r3, r8}, {r7, r5}, {r4, r8}, {0x0, r8}, {0x0, r8}, {r3}, {r4, r5}, {r6, r5}, {r10, r5}, {r3, r5}, {r10, r9}, {r6, r8}, {r3, r8}, {r7, r5}, {0x0, r9}, {r7, r8}, {r10, r5}, {0x0, r5}, {r3, r8}, {r4}, {r10, r9}, {r7, r8}, {r4, r5}, {r6, r5}, {r3, r5}, {r4, r9}, {r6, r8}, {r3}, {r3}, {r3}, {r3, r8}, {r3, r8}, {r6, r8}, {r6, r8}, {r4, r5}, {r10, r8}, {r6, r9}, {r6, r5}, {0x0, r9}, {r3, r9}, {r3, r5}, {r10, r9}, {r10}, {0x0, r9}, {r7, r8}, {r7, r8}, {r3, r9}, {0x0, r9}, {r6, r8}, {r7, r8}, {r6, r9}, {r6, r9}, {r7, r9}, {r10, r5}, {r10, r5}, {r3, r5}, {r10, r8}, {r10, r5}, {r7, r5}, {r6}, {}, {r6, r5}, {r3}, {0x0, r9}, {r4}, {r7, r9}, {r7, r9}, {r3, r8}, {r3, r9}], 0x7, "a2eeb4b849d8ac"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000002800)={{r12, 0x9, 0x7fffffff, 0xffffffffffffffff, 0x100000000, 0x6, 0x80000001, 0x1, 0x3000000, 0x2ad1, 0x3ff, 0x1000, 0x20, 0xfc0000, 0x5}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000002800)={{r12, 0x9, 0x7fffffff, 0xffffffffffffffff, 0x100000000, 0x6, 0x80000001, 0x1, 0x3000000, 0x2ad1, 0x3ff, 0x1000, 0x20, 0xfc0000, 0x5}}) setsockopt$inet6_icmp_ICMP_FILTER(r11, 0x1, 0x1, &(0x7f0000003800)={0x8000}, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000003840)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000003840)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r11, 0x5000943f, &(0x7f0000003a40)={{r1}, r14, 0x1e, @unused=[0x3, 0x2, 0x7, 0x200], @subvolid=0x43}) r15 = ioctl$TIOCGPTPEER(r11, 0x5441, 0x30) r16 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000004a40)={r13, 0xfffffffffffff5c3}) (async) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000004a40)={r13, 0xfffffffffffff5c3}) ioctl$PIO_CMAP(r15, 0x4b71, &(0x7f0000005a40)={0x80, 0xffff, 0x9, 0xc0c, 0x9, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFSUUID(r17, 0x4008662c, &(0x7f0000005ac0)={0x0, 0x0, "c303484699c15c7d0b53b32f281c6331"}) ioctl$TIOCSWINSZ(r11, 0x5414, &(0x7f0000005b00)={0x1, 0xc9, 0x99, 0x9}) write$P9_RSTATFS(r11, &(0x7f0000005b40)={0x43, 0x9, 0x2, {0xff, 0x547, 0x400, 0x2, 0x100000001, 0x30, 0x5, 0x24, 0x81}}, 0x43) (async) write$P9_RSTATFS(r11, &(0x7f0000005b40)={0x43, 0x9, 0x2, {0xff, 0x547, 0x400, 0x2, 0x100000001, 0x30, 0x5, 0x24, 0x81}}, 0x43) r19 = dup2(r16, r18) write$P9_RSTAT(r19, &(0x7f0000005bc0)={0x4a, 0x7d, 0x1, {0x0, 0x43, 0x4a00, 0x80, {0x1, 0x1, 0x2}, 0x8810000, 0xb7, 0xffffff81, 0x6, 0x6, 'icmp6\x00', 0x1, '\x00', 0x6, 'icmp6\x00', 0x3, ',/)'}}, 0x4a) write$P9_RUNLINKAT(r19, &(0x7f0000005c40)={0x7, 0x4d, 0x2}, 0x7) ioctl$EXT4_IOC_SETFSUUID(0xffffffffffffffff, 0x4008662c, &(0x7f0000005c80)={0x10, 0x0, "2f512a602c090b52c32f31230b338e3f"}) (async) ioctl$EXT4_IOC_SETFSUUID(0xffffffffffffffff, 0x4008662c, &(0x7f0000005c80)={0x10, 0x0, "2f512a602c090b52c32f31230b338e3f"}) getpgrp(0x0) (async) r20 = getpgrp(0x0) fcntl$lock(r0, 0x7, &(0x7f0000005cc0)={0x2, 0x0, 0xffffffffffffffff, 0x6, r20}) D0706 16:21:27.275912 711557 usertrap_amd64.go:212] [ 1503(15745): 1503(15745)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:27.276024 711557 usertrap_amd64.go:122] [ 1503(15745): 1503(15745)] Allocate a new trap: 0xc0038ed800 41 D0706 16:21:27.276237 711557 usertrap_amd64.go:225] [ 1503(15745): 1503(15745)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:27.294035 711557 usertrap_amd64.go:212] [ 1503(15745): 1503(15745)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:27.294100 711557 usertrap_amd64.go:122] [ 1503(15745): 1503(15745)] Allocate a new trap: 0xc0038ed800 42 D0706 16:21:27.294226 711557 usertrap_amd64.go:225] [ 1503(15745): 1503(15745)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:27.308639 711557 usertrap_amd64.go:212] [ 1503(15745): 1507(15746)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:27.308733 711557 usertrap_amd64.go:122] [ 1503(15745): 1507(15746)] Allocate a new trap: 0xc0038ed800 43 D0706 16:21:27.308857 711557 usertrap_amd64.go:225] [ 1503(15745): 1507(15746)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:27.311328 711557 usertrap_amd64.go:212] [ 1508(16367): 1508(16367)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:27.311411 711557 usertrap_amd64.go:122] [ 1508(16367): 1508(16367)] Allocate a new trap: 0xc008510570 40 D0706 16:21:27.312389 711557 usertrap_amd64.go:225] [ 1508(16367): 1508(16367)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:27.315734 711557 usertrap_amd64.go:212] [ 1508(16367): 1508(16367)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:27.315834 711557 usertrap_amd64.go:122] [ 1508(16367): 1508(16367)] Allocate a new trap: 0xc008510570 41 D0706 16:21:27.315901 711557 usertrap_amd64.go:225] [ 1508(16367): 1508(16367)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:27.330125 711557 usertrap_amd64.go:212] [ 1508(16367): 1508(16367)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:27.330340 711557 usertrap_amd64.go:122] [ 1508(16367): 1508(16367)] Allocate a new trap: 0xc008510570 42 D0706 16:21:27.330460 711557 usertrap_amd64.go:225] [ 1508(16367): 1508(16367)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:27.341588 711557 usertrap_amd64.go:212] [ 1508(16367): 1509(16368)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:27.341675 711557 usertrap_amd64.go:122] [ 1508(16367): 1509(16368)] Allocate a new trap: 0xc008510570 43 D0706 16:21:27.341728 711557 usertrap_amd64.go:225] [ 1508(16367): 1509(16368)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:27.359439 711557 usertrap_amd64.go:212] [ 1508(16367): 1508(16367)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:27.359594 711557 usertrap_amd64.go:122] [ 1508(16367): 1508(16367)] Allocate a new trap: 0xc008510570 44 D0706 16:21:27.359724 711557 usertrap_amd64.go:225] [ 1508(16367): 1508(16367)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:27.363842 711557 task_exit.go:204] [ 1508(16367): 1508(16367)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.364224 711557 task_signals.go:204] [ 1508(16367): 1509(16368)] Signal 1508, PID: 1509, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.364485 711557 task_signals.go:204] [ 1508(16367): 1510(16369)] Signal 1508, PID: 1510, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.364669 711557 task_exit.go:204] [ 1508(16367): 1510(16369)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.364879 711557 task_exit.go:204] [ 1508(16367): 1510(16369)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.365034 711557 task_exit.go:204] [ 1508(16367): 1510(16369)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.365273 711557 task_exit.go:204] [ 1508(16367): 1508(16367)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.365459 711557 task_exit.go:204] [ 1508(16367): 1509(16368)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.373894 711557 task_exit.go:204] [ 1508(16367): 1509(16368)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.373981 711557 task_exit.go:204] [ 1508(16367): 1509(16368)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.374069 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:27.375138 711557 task_exit.go:204] [ 1508(16367): 1508(16367)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@phonet, &(0x7f0000000100)=0x80, 0x0) dup2(r2, r1) unlink(&(0x7f0000000000)='./file0\x00') getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x19, 0x0, &(0x7f0000000040)) D0706 16:21:27.384114 711557 usertrap_amd64.go:212] [ 1503(15745): 1503(15745)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:27.384230 711557 usertrap_amd64.go:122] [ 1503(15745): 1503(15745)] Allocate a new trap: 0xc0038ed800 44 D0706 16:21:27.384308 711557 usertrap_amd64.go:225] [ 1503(15745): 1503(15745)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:27.443879 711557 usertrap_amd64.go:212] [ 1501(17842): 1501(17842)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:27.443964 711557 usertrap_amd64.go:122] [ 1501(17842): 1501(17842)] Allocate a new trap: 0xc173599140 43 D0706 16:21:27.444065 711557 usertrap_amd64.go:225] [ 1501(17842): 1501(17842)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:27.458068 711557 usertrap_amd64.go:212] [ 1492(16981): 1492(16981)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:27.458357 711557 usertrap_amd64.go:122] [ 1492(16981): 1492(16981)] Allocate a new trap: 0xc0038ed7d0 45 D0706 16:21:27.458572 711557 usertrap_amd64.go:225] [ 1492(16981): 1492(16981)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:27.714001 711557 task_exit.go:204] [ 1492(16981): 1492(16981)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.714342 711557 task_signals.go:204] [ 1492(16981): 1495(16982)] Signal 1492, PID: 1495, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.714486 711557 usertrap_amd64.go:212] [ 1501(17842): 1501(17842)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:27.714498 711557 task_exit.go:204] [ 1492(16981): 1495(16982)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.714551 711557 usertrap_amd64.go:122] [ 1501(17842): 1501(17842)] Allocate a new trap: 0xc173599140 44 D0706 16:21:27.714668 711557 usertrap_amd64.go:225] [ 1501(17842): 1501(17842)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:27.714831 711557 task_exit.go:204] [ 1492(16981): 1495(16982)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.714910 711557 task_exit.go:204] [ 1492(16981): 1495(16982)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.715174 711557 task_signals.go:204] [ 1492(16981): 1499(16983)] Signal 1492, PID: 1499, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.715211 711557 task_exit.go:204] [ 1492(16981): 1492(16981)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.715341 711557 task_exit.go:204] [ 1492(16981): 1499(16983)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.721121 711557 task_exit.go:204] [ 1501(17842): 1501(17842)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.721369 711557 task_exit.go:204] [ 1501(17842): 1501(17842)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.721606 711557 task_signals.go:204] [ 1501(17842): 1511(17844)] Signal 1501, PID: 1511, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.721705 711557 task_exit.go:204] [ 1501(17842): 1511(17844)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.721841 711557 task_signals.go:204] [ 1501(17842): 1513(17845)] Signal 1501, PID: 1513, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.721916 711557 task_exit.go:204] [ 1501(17842): 1511(17844)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.721967 711557 task_exit.go:204] [ 1501(17842): 1511(17844)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.722076 711557 task_exit.go:204] [ 1501(17842): 1513(17845)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.722267 711557 task_signals.go:204] [ 1501(17842): 1506(17843)] Signal 1501, PID: 1506, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.722371 711557 task_exit.go:204] [ 1501(17842): 1506(17843)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.722568 711557 task_exit.go:204] [ 1501(17842): 1513(17845)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.722629 711557 task_exit.go:204] [ 1501(17842): 1513(17845)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.724662 711557 task_exit.go:204] [ 1492(16981): 1499(16983)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.724749 711557 task_exit.go:204] [ 1492(16981): 1499(16983)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.724869 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:27.725296 711557 task_exit.go:204] [ 1492(16981): 1492(16981)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) r3 = syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f0000001e00)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:27.733257 711557 task_exit.go:204] [ 1501(17842): 1506(17843)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.733334 711557 task_exit.go:204] [ 1501(17842): 1506(17843)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.733456 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:27.733563 711557 task_exit.go:204] [ 1501(17842): 1501(17842)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x9, 0xd8) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:27.739521 711557 usertrap_amd64.go:212] [ 1514(16370): 1514(16370)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:27.739738 711557 usertrap_amd64.go:122] [ 1514(16370): 1514(16370)] Allocate a new trap: 0xc0038ed8c0 40 D0706 16:21:27.740831 711557 usertrap_amd64.go:225] [ 1514(16370): 1514(16370)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:27.744799 711557 usertrap_amd64.go:212] [ 1514(16370): 1514(16370)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:27.744876 711557 usertrap_amd64.go:122] [ 1514(16370): 1514(16370)] Allocate a new trap: 0xc0038ed8c0 41 D0706 16:21:27.745103 711557 usertrap_amd64.go:225] [ 1514(16370): 1514(16370)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:27.825085 711557 usertrap_amd64.go:212] [ 1515(16984): 1515(16984)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:27.825271 711557 usertrap_amd64.go:122] [ 1515(16984): 1515(16984)] Allocate a new trap: 0xc0085105a0 40 D0706 16:21:27.826379 711557 usertrap_amd64.go:225] [ 1515(16984): 1515(16984)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:27.830525 711557 usertrap_amd64.go:212] [ 1514(16370): 1514(16370)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:27.830811 711557 usertrap_amd64.go:122] [ 1514(16370): 1514(16370)] Allocate a new trap: 0xc0038ed8c0 42 D0706 16:21:27.831077 711557 usertrap_amd64.go:225] [ 1514(16370): 1514(16370)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:27.832996 711557 usertrap_amd64.go:212] [ 1515(16984): 1515(16984)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:27.833102 711557 usertrap_amd64.go:122] [ 1515(16984): 1515(16984)] Allocate a new trap: 0xc0085105a0 41 D0706 16:21:27.833198 711557 usertrap_amd64.go:225] [ 1515(16984): 1515(16984)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:27.842949 711557 usertrap_amd64.go:212] [ 1514(16370): 1514(16370)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:27.843073 711557 usertrap_amd64.go:122] [ 1514(16370): 1514(16370)] Allocate a new trap: 0xc0038ed8c0 43 D0706 16:21:27.843187 711557 usertrap_amd64.go:225] [ 1514(16370): 1514(16370)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:27.848761 711557 task_exit.go:204] [ 1514(16370): 1514(16370)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.848973 711557 task_signals.go:204] [ 1514(16370): 1517(16371)] Signal 1514, PID: 1517, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.849058 711557 task_exit.go:204] [ 1514(16370): 1514(16370)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.849275 711557 task_exit.go:204] [ 1514(16370): 1517(16371)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.850328 711557 usertrap_amd64.go:212] [ 1516(17846): 1516(17846)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:27.850426 711557 usertrap_amd64.go:122] [ 1516(17846): 1516(17846)] Allocate a new trap: 0xc008918a80 40 D0706 16:21:27.851275 711557 usertrap_amd64.go:225] [ 1516(17846): 1516(17846)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:27.852227 711557 usertrap_amd64.go:212] [ 1515(16984): 1515(16984)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:27.852299 711557 usertrap_amd64.go:122] [ 1515(16984): 1515(16984)] Allocate a new trap: 0xc0085105a0 42 D0706 16:21:27.852422 711557 usertrap_amd64.go:225] [ 1515(16984): 1515(16984)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:27.855051 711557 usertrap_amd64.go:212] [ 1516(17846): 1516(17846)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:27.855218 711557 usertrap_amd64.go:122] [ 1516(17846): 1516(17846)] Allocate a new trap: 0xc008918a80 41 D0706 16:21:27.855332 711557 usertrap_amd64.go:225] [ 1516(17846): 1516(17846)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:27.857735 711557 task_exit.go:204] [ 1514(16370): 1517(16371)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.857800 711557 task_exit.go:204] [ 1514(16370): 1517(16371)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.857922 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:27.858100 711557 task_exit.go:204] [ 1514(16370): 1514(16370)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@phonet, &(0x7f0000000100)=0x80, 0x0) (async) dup2(r2, r1) (async) unlink(&(0x7f0000000000)='./file0\x00') (async) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x19, 0x0, &(0x7f0000000040)) D0706 16:21:27.861866 711557 usertrap_amd64.go:212] [ 1515(16984): 1518(16985)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:27.861935 711557 usertrap_amd64.go:122] [ 1515(16984): 1518(16985)] Allocate a new trap: 0xc0085105a0 43 D0706 16:21:27.862070 711557 usertrap_amd64.go:225] [ 1515(16984): 1518(16985)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:27.876203 711557 usertrap_amd64.go:212] [ 1516(17846): 1516(17846)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:27.876346 711557 usertrap_amd64.go:122] [ 1516(17846): 1516(17846)] Allocate a new trap: 0xc008918a80 42 D0706 16:21:27.876498 711557 usertrap_amd64.go:225] [ 1516(17846): 1516(17846)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:27.888397 711557 usertrap_amd64.go:212] [ 1519(16372): 1519(16372)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:27.888514 711557 usertrap_amd64.go:122] [ 1519(16372): 1519(16372)] Allocate a new trap: 0xc000475440 40 D0706 16:21:27.889454 711557 usertrap_amd64.go:225] [ 1519(16372): 1519(16372)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:27.892733 711557 usertrap_amd64.go:212] [ 1519(16372): 1519(16372)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:27.892854 711557 usertrap_amd64.go:122] [ 1519(16372): 1519(16372)] Allocate a new trap: 0xc000475440 41 D0706 16:21:27.892979 711557 usertrap_amd64.go:225] [ 1519(16372): 1519(16372)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:27.907602 711557 usertrap_amd64.go:212] [ 1519(16372): 1519(16372)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:27.907725 711557 usertrap_amd64.go:122] [ 1519(16372): 1519(16372)] Allocate a new trap: 0xc000475440 42 D0706 16:21:27.907801 711557 usertrap_amd64.go:225] [ 1519(16372): 1519(16372)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:27.926422 711557 usertrap_amd64.go:212] [ 1519(16372): 1519(16372)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:27.926509 711557 usertrap_amd64.go:122] [ 1519(16372): 1519(16372)] Allocate a new trap: 0xc000475440 43 D0706 16:21:27.926601 711557 usertrap_amd64.go:225] [ 1519(16372): 1519(16372)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:27.936185 711557 task_exit.go:204] [ 1519(16372): 1519(16372)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.936574 711557 task_signals.go:204] [ 1519(16372): 1522(16373)] Signal 1519, PID: 1522, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.936612 711557 task_signals.go:204] [ 1519(16372): 1524(16375)] Signal 1519, PID: 1524, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.936665 711557 task_exit.go:204] [ 1519(16372): 1519(16372)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.937183 711557 task_signals.go:204] [ 1519(16372): 1523(16374)] Signal 1519, PID: 1523, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:27.937291 711557 task_exit.go:204] [ 1519(16372): 1523(16374)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.937556 711557 task_exit.go:204] [ 1519(16372): 1522(16373)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.938023 711557 task_exit.go:204] [ 1519(16372): 1524(16375)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:27.941528 711557 task_exit.go:204] [ 1519(16372): 1523(16374)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.941628 711557 task_exit.go:204] [ 1519(16372): 1523(16374)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.941869 711557 task_exit.go:204] [ 1519(16372): 1522(16373)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.941944 711557 task_exit.go:204] [ 1519(16372): 1522(16373)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.952685 711557 task_exit.go:204] [ 1519(16372): 1524(16375)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:27.952787 711557 task_exit.go:204] [ 1519(16372): 1524(16375)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:27.952878 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:27.954877 711557 task_exit.go:204] [ 1519(16372): 1519(16372)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x80) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@phonet, &(0x7f0000000100)=0x80, 0x0) (async) dup2(r2, r1) (async) unlink(&(0x7f0000000000)='./file0\x00') (async) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x19, 0x0, &(0x7f0000000040)) D0706 16:21:28.001608 711557 usertrap_amd64.go:212] [ 1515(16984): 1515(16984)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:28.001704 711557 usertrap_amd64.go:122] [ 1515(16984): 1515(16984)] Allocate a new trap: 0xc0085105a0 44 D0706 16:21:28.001844 711557 usertrap_amd64.go:225] [ 1515(16984): 1515(16984)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:28.050135 711557 usertrap_amd64.go:212] [ 1516(17846): 1516(17846)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:28.050242 711557 usertrap_amd64.go:122] [ 1516(17846): 1516(17846)] Allocate a new trap: 0xc008918a80 43 D0706 16:21:28.050334 711557 usertrap_amd64.go:225] [ 1516(17846): 1516(17846)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:28.122525 711557 usertrap_amd64.go:212] [ 1503(15745): 1503(15745)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:28.122687 711557 usertrap_amd64.go:122] [ 1503(15745): 1503(15745)] Allocate a new trap: 0xc0038ed800 45 D0706 16:21:28.122809 711557 usertrap_amd64.go:225] [ 1503(15745): 1503(15745)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:28.126799 711557 task_exit.go:204] [ 1503(15745): 1503(15745)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.127036 711557 task_exit.go:204] [ 1503(15745): 1503(15745)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.127247 711557 task_signals.go:204] [ 1503(15745): 1507(15746)] Signal 1503, PID: 1507, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.127342 711557 task_exit.go:204] [ 1503(15745): 1507(15746)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.127554 711557 task_signals.go:204] [ 1503(15745): 1512(15747)] Signal 1503, PID: 1512, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.127646 711557 task_exit.go:204] [ 1503(15745): 1507(15746)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.127683 711557 task_exit.go:204] [ 1503(15745): 1507(15746)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.128192 711557 task_exit.go:204] [ 1503(15745): 1512(15747)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.137313 711557 task_exit.go:204] [ 1503(15745): 1512(15747)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.137404 711557 task_exit.go:204] [ 1503(15745): 1512(15747)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.137514 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:28.137656 711557 task_exit.go:204] [ 1503(15745): 1503(15745)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:28 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:28.303187 711557 usertrap_amd64.go:212] [ 1516(17846): 1516(17846)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:28.303259 711557 usertrap_amd64.go:122] [ 1516(17846): 1516(17846)] Allocate a new trap: 0xc008918a80 44 D0706 16:21:28.303329 711557 usertrap_amd64.go:225] [ 1516(17846): 1516(17846)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:28.309895 711557 task_exit.go:204] [ 1516(17846): 1516(17846)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.310069 711557 task_signals.go:204] [ 1516(17846): 1520(17847)] Signal 1516, PID: 1520, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.310093 711557 task_signals.go:204] [ 1516(17846): 1521(17848)] Signal 1516, PID: 1521, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.310164 711557 task_exit.go:204] [ 1516(17846): 1516(17846)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.310227 711557 task_signals.go:204] [ 1516(17846): 1526(17849)] Signal 1516, PID: 1526, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.310250 711557 task_exit.go:204] [ 1516(17846): 1520(17847)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.310347 711557 task_exit.go:204] [ 1516(17846): 1526(17849)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.310553 711557 task_exit.go:204] [ 1516(17846): 1526(17849)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.310738 711557 task_exit.go:204] [ 1516(17846): 1526(17849)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.310536 711557 task_signals.go:204] [ 1516(17846): 1527(17850)] Signal 1516, PID: 1527, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.311240 711557 task_exit.go:204] [ 1516(17846): 1527(17850)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.311424 711557 task_exit.go:204] [ 1516(17846): 1521(17848)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.312068 711557 task_exit.go:204] [ 1516(17846): 1520(17847)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.312146 711557 task_exit.go:204] [ 1516(17846): 1520(17847)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.312262 711557 task_exit.go:204] [ 1516(17846): 1527(17850)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.312306 711557 task_exit.go:204] [ 1516(17846): 1527(17850)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.321192 711557 task_exit.go:204] [ 1516(17846): 1521(17848)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.321280 711557 task_exit.go:204] [ 1516(17846): 1521(17848)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.321372 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:28.324359 711557 task_exit.go:204] [ 1516(17846): 1516(17846)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:28 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x9, 0xd8) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:28.415874 711557 usertrap_amd64.go:212] [ 1528(16376): 1528(16376)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:28.416119 711557 usertrap_amd64.go:122] [ 1528(16376): 1528(16376)] Allocate a new trap: 0xc1735992f0 40 D0706 16:21:28.417227 711557 usertrap_amd64.go:225] [ 1528(16376): 1528(16376)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:28.421062 711557 usertrap_amd64.go:212] [ 1528(16376): 1528(16376)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:28.421232 711557 usertrap_amd64.go:122] [ 1528(16376): 1528(16376)] Allocate a new trap: 0xc1735992f0 41 D0706 16:21:28.421376 711557 usertrap_amd64.go:225] [ 1528(16376): 1528(16376)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:28.427460 711557 usertrap_amd64.go:212] [ 1529(15748): 1529(15748)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:28.427609 711557 usertrap_amd64.go:122] [ 1529(15748): 1529(15748)] Allocate a new trap: 0xc00c211140 40 D0706 16:21:28.428497 711557 usertrap_amd64.go:225] [ 1529(15748): 1529(15748)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:28.433161 711557 usertrap_amd64.go:212] [ 1529(15748): 1529(15748)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:28.433246 711557 usertrap_amd64.go:122] [ 1529(15748): 1529(15748)] Allocate a new trap: 0xc00c211140 41 D0706 16:21:28.433336 711557 usertrap_amd64.go:225] [ 1529(15748): 1529(15748)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:28.441277 711557 usertrap_amd64.go:212] [ 1528(16376): 1528(16376)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:28.441381 711557 usertrap_amd64.go:122] [ 1528(16376): 1528(16376)] Allocate a new trap: 0xc1735992f0 42 D0706 16:21:28.441455 711557 usertrap_amd64.go:225] [ 1528(16376): 1528(16376)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:28.456654 711557 usertrap_amd64.go:212] [ 1528(16376): 1528(16376)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:28.456734 711557 usertrap_amd64.go:122] [ 1528(16376): 1528(16376)] Allocate a new trap: 0xc1735992f0 43 D0706 16:21:28.456838 711557 usertrap_amd64.go:225] [ 1528(16376): 1528(16376)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:28.464320 711557 usertrap_amd64.go:212] [ 1529(15748): 1529(15748)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:28.464378 711557 usertrap_amd64.go:122] [ 1529(15748): 1529(15748)] Allocate a new trap: 0xc00c211140 42 D0706 16:21:28.464502 711557 usertrap_amd64.go:212] [ 1530(17851): 1530(17851)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:28.464619 711557 usertrap_amd64.go:122] [ 1530(17851): 1530(17851)] Allocate a new trap: 0xc16ed8f320 40 D0706 16:21:28.464516 711557 usertrap_amd64.go:225] [ 1529(15748): 1529(15748)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:28.465575 711557 usertrap_amd64.go:225] [ 1530(17851): 1530(17851)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:28.471031 711557 usertrap_amd64.go:212] [ 1530(17851): 1530(17851)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:28.471111 711557 usertrap_amd64.go:122] [ 1530(17851): 1530(17851)] Allocate a new trap: 0xc16ed8f320 41 D0706 16:21:28.471240 711557 usertrap_amd64.go:225] [ 1530(17851): 1530(17851)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:28.472912 711557 task_exit.go:204] [ 1528(16376): 1528(16376)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.473155 711557 task_signals.go:204] [ 1528(16376): 1531(16377)] Signal 1528, PID: 1531, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.473149 711557 task_signals.go:204] [ 1528(16376): 1533(16379)] Signal 1528, PID: 1533, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.473264 711557 task_exit.go:204] [ 1528(16376): 1531(16377)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.473479 711557 task_exit.go:204] [ 1528(16376): 1528(16376)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.473591 711557 task_signals.go:204] [ 1528(16376): 1532(16378)] Signal 1528, PID: 1532, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.473675 711557 task_exit.go:204] [ 1528(16376): 1532(16378)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.474086 711557 task_exit.go:204] [ 1528(16376): 1533(16379)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.474362 711557 task_exit.go:204] [ 1528(16376): 1531(16377)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.474439 711557 task_exit.go:204] [ 1528(16376): 1531(16377)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.474559 711557 task_exit.go:204] [ 1528(16376): 1532(16378)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.474622 711557 task_exit.go:204] [ 1528(16376): 1532(16378)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.483228 711557 task_exit.go:204] [ 1528(16376): 1533(16379)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.483316 711557 task_exit.go:204] [ 1528(16376): 1533(16379)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.483414 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:28.483610 711557 task_exit.go:204] [ 1528(16376): 1528(16376)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:28 executing program 1: ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x7fffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000040)={0x8001, 0x8, 0x2, 0x1, 0x9, "0b5e87d1c9adbcf4182c6c276404d911849591"}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x16) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x13) r2 = syz_open_pts(r1, 0x107400) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x111900, 0x24) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000180)) dup3(r2, r3, 0x80000) ioctl$TCSETA(r1, 0x5406, &(0x7f00000001c0)={0x85a, 0x2, 0x6, 0x1, 0xe, "736d4ea4007fca54"}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) read$FUSE(r3, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) stat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000023c0)={{}, {0x1, 0x6}, [{0x2, 0x5, r4}, {0x2, 0x6, r5}], {0x4, 0x7}, [{0x8, 0x2, r7}], {0x10, 0x1}, {0x20, 0x3}}, 0x3c, 0x1) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) fcntl$lock(r8, 0x5, &(0x7f0000002440)={0x1, 0x4, 0x1, 0x3f, r6}) read(r2, &(0x7f0000002480)=""/158, 0x9e) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000002540), &(0x7f0000002580), 0x2, 0x1) r9 = syz_open_pts(r3, 0x40000) ioctl$TIOCL_SETVESABLANK(r9, 0x541c, &(0x7f00000025c0)) pwrite64(r3, &(0x7f0000002600)="73e4fe34d01462854c6fe49274f5529abf0a7b559859cb7c1678f50a85911af012691fe2aeaaa2eebb153de023fdf880f8fa90c5cc469dae857898c1c4291ded149968cc7dc675bd848e6b2afda39a80c354b599514cbaac53af80601a85f7282a3990c6d1b3d918d14dc9174e6ca644812a23be316505a1448a6618af7c26d1a54c9b6a1cc0ab72aa4e7d41e148b1dcaf860601e750859b8962cb1c74a7783fd4aace4d63d898d12688f9760dca9424d2cbb190fbfce70656ce63c89931926126ac268e10756a", 0xc7, 0x3) r10 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r10, 0x8008f512, &(0x7f0000002700)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000002740)=0x7fff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000027c0), &(0x7f0000002800), 0x2, 0x1) D0706 16:21:28.494827 711557 usertrap_amd64.go:212] [ 1529(15748): 1534(15749)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:28.494922 711557 usertrap_amd64.go:122] [ 1529(15748): 1534(15749)] Allocate a new trap: 0xc00c211140 43 D0706 16:21:28.495058 711557 usertrap_amd64.go:225] [ 1529(15748): 1534(15749)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:28.500234 711557 usertrap_amd64.go:212] [ 1530(17851): 1530(17851)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:28.500342 711557 usertrap_amd64.go:122] [ 1530(17851): 1530(17851)] Allocate a new trap: 0xc16ed8f320 42 D0706 16:21:28.500409 711557 usertrap_amd64.go:225] [ 1530(17851): 1530(17851)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:28.528682 711557 usertrap_amd64.go:212] [ 1530(17851): 1530(17851)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:28.528794 711557 usertrap_amd64.go:122] [ 1530(17851): 1530(17851)] Allocate a new trap: 0xc16ed8f320 43 D0706 16:21:28.528868 711557 usertrap_amd64.go:225] [ 1530(17851): 1530(17851)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:28.534848 711557 usertrap_amd64.go:212] [ 1536(16380): 1536(16380)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:28.534941 711557 usertrap_amd64.go:122] [ 1536(16380): 1536(16380)] Allocate a new trap: 0xc00fc59ec0 40 D0706 16:21:28.535733 711557 usertrap_amd64.go:225] [ 1536(16380): 1536(16380)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:28.539202 711557 usertrap_amd64.go:212] [ 1536(16380): 1536(16380)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:28.539266 711557 usertrap_amd64.go:122] [ 1536(16380): 1536(16380)] Allocate a new trap: 0xc00fc59ec0 41 D0706 16:21:28.539380 711557 usertrap_amd64.go:225] [ 1536(16380): 1536(16380)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:28.563119 711557 usertrap_amd64.go:212] [ 1529(15748): 1529(15748)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:28.563272 711557 usertrap_amd64.go:122] [ 1529(15748): 1529(15748)] Allocate a new trap: 0xc00c211140 44 D0706 16:21:28.563358 711557 usertrap_amd64.go:225] [ 1529(15748): 1529(15748)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:28.676470 711557 usertrap_amd64.go:212] [ 1515(16984): 1515(16984)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:28.676692 711557 usertrap_amd64.go:122] [ 1515(16984): 1515(16984)] Allocate a new trap: 0xc0085105a0 45 D0706 16:21:28.676789 711557 usertrap_amd64.go:225] [ 1515(16984): 1515(16984)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:28.964892 711557 usertrap_amd64.go:212] [ 1530(17851): 1530(17851)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:28.965135 711557 usertrap_amd64.go:122] [ 1530(17851): 1530(17851)] Allocate a new trap: 0xc16ed8f320 44 D0706 16:21:28.965332 711557 usertrap_amd64.go:225] [ 1530(17851): 1530(17851)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:28.967611 711557 task_exit.go:204] [ 1515(16984): 1515(16984)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.967845 711557 task_signals.go:204] [ 1515(16984): 1525(16986)] Signal 1515, PID: 1525, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.968491 711557 task_signals.go:204] [ 1515(16984): 1518(16985)] Signal 1515, PID: 1518, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.968616 711557 task_exit.go:204] [ 1515(16984): 1515(16984)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.968733 711557 task_exit.go:204] [ 1515(16984): 1518(16985)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.969039 711557 task_exit.go:204] [ 1515(16984): 1525(16986)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.969272 711557 task_exit.go:204] [ 1515(16984): 1518(16985)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.969343 711557 task_exit.go:204] [ 1515(16984): 1518(16985)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.977929 711557 task_exit.go:204] [ 1515(16984): 1525(16986)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.978057 711557 task_exit.go:204] [ 1515(16984): 1525(16986)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.978154 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:28.980108 711557 task_exit.go:204] [ 1530(17851): 1530(17851)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.980324 711557 task_signals.go:204] [ 1530(17851): 1535(17852)] Signal 1530, PID: 1535, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.980513 711557 task_signals.go:204] [ 1530(17851): 1538(17854)] Signal 1530, PID: 1538, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.980634 711557 task_exit.go:204] [ 1530(17851): 1538(17854)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.980745 711557 task_signals.go:204] [ 1530(17851): 1537(17853)] Signal 1530, PID: 1537, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:28.980771 711557 task_exit.go:204] [ 1530(17851): 1535(17852)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.981024 711557 task_exit.go:204] [ 1530(17851): 1537(17853)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:28.981221 711557 task_exit.go:204] [ 1530(17851): 1535(17852)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.981310 711557 task_exit.go:204] [ 1530(17851): 1535(17852)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.981477 711557 task_exit.go:204] [ 1530(17851): 1530(17851)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.981908 711557 task_exit.go:204] [ 1515(16984): 1515(16984)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.983717 711557 task_exit.go:204] [ 1530(17851): 1537(17853)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.983799 711557 task_exit.go:204] [ 1530(17851): 1537(17853)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:28 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:28.989623 711557 usertrap_amd64.go:212] [ 1536(16380): 1536(16380)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:28.989711 711557 usertrap_amd64.go:122] [ 1536(16380): 1536(16380)] Allocate a new trap: 0xc00fc59ec0 42 D0706 16:21:28.989789 711557 usertrap_amd64.go:225] [ 1536(16380): 1536(16380)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:28.990831 711557 task_exit.go:204] [ 1530(17851): 1538(17854)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:28.990903 711557 task_exit.go:204] [ 1530(17851): 1538(17854)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:28.991025 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:28.991832 711557 task_exit.go:204] [ 1530(17851): 1530(17851)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:28 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fallocate(r0, 0x9, 0xb6a3, 0x7) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:29.062767 711557 usertrap_amd64.go:212] [ 1536(16380): 1540(16381)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:29.062873 711557 usertrap_amd64.go:122] [ 1536(16380): 1540(16381)] Allocate a new trap: 0xc00fc59ec0 43 D0706 16:21:29.062939 711557 usertrap_amd64.go:225] [ 1536(16380): 1540(16381)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:29.075095 711557 usertrap_amd64.go:212] [ 1541(16987): 1541(16987)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:29.075172 711557 usertrap_amd64.go:122] [ 1541(16987): 1541(16987)] Allocate a new trap: 0xc0038ed920 40 D0706 16:21:29.076041 711557 usertrap_amd64.go:225] [ 1541(16987): 1541(16987)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:29.080283 711557 usertrap_amd64.go:212] [ 1541(16987): 1541(16987)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:29.080449 711557 usertrap_amd64.go:122] [ 1541(16987): 1541(16987)] Allocate a new trap: 0xc0038ed920 41 D0706 16:21:29.080566 711557 usertrap_amd64.go:225] [ 1541(16987): 1541(16987)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:29.091112 711557 usertrap_amd64.go:212] [ 1543(17855): 1543(17855)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:29.091198 711557 usertrap_amd64.go:122] [ 1543(17855): 1543(17855)] Allocate a new trap: 0xc0038ed950 40 D0706 16:21:29.092108 711557 usertrap_amd64.go:225] [ 1543(17855): 1543(17855)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:29.093680 711557 usertrap_amd64.go:212] [ 1536(16380): 1536(16380)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:29.093747 711557 usertrap_amd64.go:122] [ 1536(16380): 1536(16380)] Allocate a new trap: 0xc00fc59ec0 44 D0706 16:21:29.093806 711557 usertrap_amd64.go:225] [ 1536(16380): 1536(16380)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:29.095673 711557 task_exit.go:204] [ 1536(16380): 1536(16380)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.095839 711557 task_signals.go:204] [ 1536(16380): 1540(16381)] Signal 1536, PID: 1540, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.096023 711557 task_signals.go:204] [ 1536(16380): 1542(16382)] Signal 1536, PID: 1542, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.096168 711557 task_exit.go:204] [ 1536(16380): 1542(16382)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.096340 711557 task_exit.go:204] [ 1536(16380): 1540(16381)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.096800 711557 task_exit.go:204] [ 1536(16380): 1542(16382)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.096907 711557 task_exit.go:204] [ 1536(16380): 1542(16382)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.097321 711557 task_exit.go:204] [ 1536(16380): 1536(16380)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.103697 711557 usertrap_amd64.go:212] [ 1543(17855): 1543(17855)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:29.103765 711557 usertrap_amd64.go:122] [ 1543(17855): 1543(17855)] Allocate a new trap: 0xc0038ed950 41 D0706 16:21:29.103827 711557 usertrap_amd64.go:225] [ 1543(17855): 1543(17855)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:29.105392 711557 task_exit.go:204] [ 1536(16380): 1540(16381)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.105526 711557 task_exit.go:204] [ 1536(16380): 1540(16381)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.105753 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:29.106331 711557 task_exit.go:204] [ 1536(16380): 1536(16380)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:29 executing program 1: ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x7fffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000040)={0x8001, 0x8, 0x2, 0x1, 0x9, "0b5e87d1c9adbcf4182c6c276404d911849591"}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x16) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x13) r2 = syz_open_pts(r1, 0x107400) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x111900, 0x24) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000180)) (async) dup3(r2, r3, 0x80000) (async, rerun: 32) ioctl$TCSETA(r1, 0x5406, &(0x7f00000001c0)={0x85a, 0x2, 0x6, 0x1, 0xe, "736d4ea4007fca54"}) (async, rerun: 32) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) (async, rerun: 32) read$FUSE(r3, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) stat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000023c0)={{}, {0x1, 0x6}, [{0x2, 0x5, r4}, {0x2, 0x6, r5}], {0x4, 0x7}, [{0x8, 0x2, r7}], {0x10, 0x1}, {0x20, 0x3}}, 0x3c, 0x1) (async) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) fcntl$lock(r8, 0x5, &(0x7f0000002440)={0x1, 0x4, 0x1, 0x3f, r6}) (async, rerun: 64) read(r2, &(0x7f0000002480)=""/158, 0x9e) (async, rerun: 64) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000002540), &(0x7f0000002580), 0x2, 0x1) r9 = syz_open_pts(r3, 0x40000) ioctl$TIOCL_SETVESABLANK(r9, 0x541c, &(0x7f00000025c0)) pwrite64(r3, &(0x7f0000002600)="73e4fe34d01462854c6fe49274f5529abf0a7b559859cb7c1678f50a85911af012691fe2aeaaa2eebb153de023fdf880f8fa90c5cc469dae857898c1c4291ded149968cc7dc675bd848e6b2afda39a80c354b599514cbaac53af80601a85f7282a3990c6d1b3d918d14dc9174e6ca644812a23be316505a1448a6618af7c26d1a54c9b6a1cc0ab72aa4e7d41e148b1dcaf860601e750859b8962cb1c74a7783fd4aace4d63d898d12688f9760dca9424d2cbb190fbfce70656ce63c89931926126ac268e10756a", 0xc7, 0x3) (async) r10 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r10, 0x8008f512, &(0x7f0000002700)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000002740)=0x7fff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000027c0), &(0x7f0000002800), 0x2, 0x1) D0706 16:21:29.108460 711557 usertrap_amd64.go:212] [ 1541(16987): 1541(16987)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:29.108546 711557 usertrap_amd64.go:122] [ 1541(16987): 1541(16987)] Allocate a new trap: 0xc0038ed920 42 D0706 16:21:29.108622 711557 usertrap_amd64.go:225] [ 1541(16987): 1541(16987)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:29.116509 711557 usertrap_amd64.go:212] [ 1541(16987): 1544(16988)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:29.116567 711557 usertrap_amd64.go:122] [ 1541(16987): 1544(16988)] Allocate a new trap: 0xc0038ed920 43 D0706 16:21:29.116632 711557 usertrap_amd64.go:225] [ 1541(16987): 1544(16988)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:29.123982 711557 usertrap_amd64.go:212] [ 1543(17855): 1543(17855)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:29.124038 711557 usertrap_amd64.go:122] [ 1543(17855): 1543(17855)] Allocate a new trap: 0xc0038ed950 42 D0706 16:21:29.124101 711557 usertrap_amd64.go:225] [ 1543(17855): 1543(17855)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:29.140002 711557 usertrap_amd64.go:212] [ 1545(16383): 1545(16383)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:29.140098 711557 usertrap_amd64.go:122] [ 1545(16383): 1545(16383)] Allocate a new trap: 0xc017060000 40 D0706 16:21:29.140875 711557 usertrap_amd64.go:225] [ 1545(16383): 1545(16383)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:29.144729 711557 usertrap_amd64.go:212] [ 1545(16383): 1545(16383)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:29.144846 711557 usertrap_amd64.go:122] [ 1545(16383): 1545(16383)] Allocate a new trap: 0xc017060000 41 D0706 16:21:29.144932 711557 usertrap_amd64.go:225] [ 1545(16383): 1545(16383)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:29.158525 711557 usertrap_amd64.go:212] [ 1545(16383): 1545(16383)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:29.158568 711557 usertrap_amd64.go:122] [ 1545(16383): 1545(16383)] Allocate a new trap: 0xc017060000 42 D0706 16:21:29.158635 711557 usertrap_amd64.go:225] [ 1545(16383): 1545(16383)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:29.164425 711557 usertrap_amd64.go:212] [ 1545(16383): 1547(16384)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:29.164505 711557 usertrap_amd64.go:122] [ 1545(16383): 1547(16384)] Allocate a new trap: 0xc017060000 43 D0706 16:21:29.164575 711557 usertrap_amd64.go:225] [ 1545(16383): 1547(16384)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:29.178368 711557 usertrap_amd64.go:212] [ 1545(16383): 1545(16383)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:29.178463 711557 usertrap_amd64.go:122] [ 1545(16383): 1545(16383)] Allocate a new trap: 0xc017060000 44 D0706 16:21:29.178579 711557 usertrap_amd64.go:225] [ 1545(16383): 1545(16383)] Apply the binary patch addr 55bc30e840aa trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:29.179919 711557 usertrap_amd64.go:212] [ 1545(16383): 1545(16383)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:29.180080 711557 usertrap_amd64.go:122] [ 1545(16383): 1545(16383)] Allocate a new trap: 0xc017060000 45 D0706 16:21:29.180153 711557 usertrap_amd64.go:225] [ 1545(16383): 1545(16383)] Apply the binary patch addr 55bc30e11124 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0706 16:21:29.184137 711557 task_exit.go:204] [ 1545(16383): 1545(16383)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.184673 711557 task_signals.go:204] [ 1545(16383): 1548(16385)] Signal 1545, PID: 1548, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.184766 711557 task_signals.go:204] [ 1545(16383): 1550(16387)] Signal 1545, PID: 1550, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.184723 711557 task_signals.go:204] [ 1545(16383): 1549(16386)] Signal 1545, PID: 1549, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.184926 711557 task_exit.go:204] [ 1545(16383): 1550(16387)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.185104 711557 task_signals.go:204] [ 1545(16383): 1547(16384)] Signal 1545, PID: 1547, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.185218 711557 task_exit.go:204] [ 1545(16383): 1549(16386)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.185451 711557 task_exit.go:204] [ 1545(16383): 1548(16385)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.185949 711557 task_exit.go:204] [ 1545(16383): 1550(16387)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.186032 711557 task_exit.go:204] [ 1545(16383): 1550(16387)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.186401 711557 task_exit.go:204] [ 1545(16383): 1549(16386)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.186495 711557 task_exit.go:204] [ 1545(16383): 1549(16386)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.186694 711557 task_exit.go:204] [ 1545(16383): 1547(16384)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.186889 711557 task_exit.go:204] [ 1545(16383): 1548(16385)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.187002 711557 task_exit.go:204] [ 1545(16383): 1548(16385)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.187123 711557 task_exit.go:204] [ 1545(16383): 1545(16383)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.194121 711557 task_exit.go:204] [ 1545(16383): 1547(16384)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.194211 711557 task_exit.go:204] [ 1545(16383): 1547(16384)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.194326 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:29.194502 711557 task_exit.go:204] [ 1545(16383): 1545(16383)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:29 executing program 1: ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) (async) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) (async) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x7fffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000040)={0x8001, 0x8, 0x2, 0x1, 0x9, "0b5e87d1c9adbcf4182c6c276404d911849591"}) (async) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x16) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$VT_WAITACTIVE(r1, 0x5607) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x13) (async) r2 = syz_open_pts(r1, 0x107400) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x111900, 0x24) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000180)) dup3(r2, r3, 0x80000) ioctl$TCSETA(r1, 0x5406, &(0x7f00000001c0)={0x85a, 0x2, 0x6, 0x1, 0xe, "736d4ea4007fca54"}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) (async) read$FUSE(r3, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) stat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000023c0)={{}, {0x1, 0x6}, [{0x2, 0x5, r4}, {0x2, 0x6, r5}], {0x4, 0x7}, [{0x8, 0x2, r7}], {0x10, 0x1}, {0x20, 0x3}}, 0x3c, 0x1) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) fcntl$lock(r8, 0x5, &(0x7f0000002440)={0x1, 0x4, 0x1, 0x3f, r6}) (async) read(r2, &(0x7f0000002480)=""/158, 0x9e) (async) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000002540), &(0x7f0000002580), 0x2, 0x1) (async) r9 = syz_open_pts(r3, 0x40000) ioctl$TIOCL_SETVESABLANK(r9, 0x541c, &(0x7f00000025c0)) (async) pwrite64(r3, &(0x7f0000002600)="73e4fe34d01462854c6fe49274f5529abf0a7b559859cb7c1678f50a85911af012691fe2aeaaa2eebb153de023fdf880f8fa90c5cc469dae857898c1c4291ded149968cc7dc675bd848e6b2afda39a80c354b599514cbaac53af80601a85f7282a3990c6d1b3d918d14dc9174e6ca644812a23be316505a1448a6618af7c26d1a54c9b6a1cc0ab72aa4e7d41e148b1dcaf860601e750859b8962cb1c74a7783fd4aace4d63d898d12688f9760dca9424d2cbb190fbfce70656ce63c89931926126ac268e10756a", 0xc7, 0x3) (async) r10 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r10, 0x8008f512, &(0x7f0000002700)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000002740)=0x7fff) (async) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000027c0), &(0x7f0000002800), 0x2, 0x1) D0706 16:21:29.248734 711557 usertrap_amd64.go:212] [ 1541(16987): 1541(16987)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:29.248807 711557 usertrap_amd64.go:122] [ 1541(16987): 1541(16987)] Allocate a new trap: 0xc0038ed920 44 D0706 16:21:29.248879 711557 usertrap_amd64.go:225] [ 1541(16987): 1541(16987)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:29.281156 711557 usertrap_amd64.go:212] [ 1529(15748): 1529(15748)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:29.281241 711557 usertrap_amd64.go:122] [ 1529(15748): 1529(15748)] Allocate a new trap: 0xc00c211140 45 D0706 16:21:29.281393 711557 usertrap_amd64.go:225] [ 1529(15748): 1529(15748)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:29.284275 711557 task_exit.go:204] [ 1529(15748): 1529(15748)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.284417 711557 task_signals.go:204] [ 1529(15748): 1534(15749)] Signal 1529, PID: 1534, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.284471 711557 task_signals.go:204] [ 1529(15748): 1539(15750)] Signal 1529, PID: 1539, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.284850 711557 task_exit.go:204] [ 1529(15748): 1534(15749)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.285110 711557 task_exit.go:204] [ 1529(15748): 1529(15748)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.285231 711557 task_exit.go:204] [ 1529(15748): 1539(15750)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.285320 711557 task_exit.go:204] [ 1529(15748): 1534(15749)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.285425 711557 task_exit.go:204] [ 1529(15748): 1534(15749)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.285560 711557 usertrap_amd64.go:212] [ 1543(17855): 1543(17855)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:29.285634 711557 usertrap_amd64.go:122] [ 1543(17855): 1543(17855)] Allocate a new trap: 0xc0038ed950 43 D0706 16:21:29.285744 711557 usertrap_amd64.go:225] [ 1543(17855): 1543(17855)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:29.293627 711557 task_exit.go:204] [ 1529(15748): 1539(15750)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.293710 711557 task_exit.go:204] [ 1529(15748): 1539(15750)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.293778 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:29.294840 711557 task_exit.go:204] [ 1529(15748): 1529(15748)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:29 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:29.563609 711557 usertrap_amd64.go:212] [ 1543(17855): 1543(17855)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:29.563739 711557 usertrap_amd64.go:122] [ 1543(17855): 1543(17855)] Allocate a new trap: 0xc0038ed950 44 D0706 16:21:29.563835 711557 usertrap_amd64.go:225] [ 1543(17855): 1543(17855)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:29.573056 711557 task_exit.go:204] [ 1543(17855): 1543(17855)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.573327 711557 task_signals.go:204] [ 1543(17855): 1553(17858)] Signal 1543, PID: 1553, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.573347 711557 task_signals.go:204] [ 1543(17855): 1551(17857)] Signal 1543, PID: 1551, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.573527 711557 task_signals.go:204] [ 1543(17855): 1546(17856)] Signal 1543, PID: 1546, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.573608 711557 task_exit.go:204] [ 1543(17855): 1543(17855)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.573703 711557 task_exit.go:204] [ 1543(17855): 1553(17858)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.573971 711557 task_exit.go:204] [ 1543(17855): 1553(17858)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.574025 711557 task_exit.go:204] [ 1543(17855): 1553(17858)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.574365 711557 task_exit.go:204] [ 1543(17855): 1551(17857)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.574594 711557 task_exit.go:204] [ 1543(17855): 1551(17857)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.574672 711557 task_exit.go:204] [ 1543(17855): 1551(17857)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.574776 711557 task_exit.go:204] [ 1543(17855): 1546(17856)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.586793 711557 task_exit.go:204] [ 1543(17855): 1546(17856)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.586897 711557 task_exit.go:204] [ 1543(17855): 1546(17856)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.587046 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:29.588186 711557 task_exit.go:204] [ 1543(17855): 1543(17855)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:29 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x9, 0xb6a3, 0x7) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:29.659660 711557 usertrap_amd64.go:212] [ 1555(15751): 1555(15751)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:29.659803 711557 usertrap_amd64.go:122] [ 1555(15751): 1555(15751)] Allocate a new trap: 0xc2f1c5e2d0 40 D0706 16:21:29.660317 711557 usertrap_amd64.go:212] [ 1554(16388): 1554(16388)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:29.660430 711557 usertrap_amd64.go:122] [ 1554(16388): 1554(16388)] Allocate a new trap: 0xc0004754a0 40 D0706 16:21:29.661234 711557 usertrap_amd64.go:225] [ 1555(15751): 1555(15751)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:29.661342 711557 usertrap_amd64.go:225] [ 1554(16388): 1554(16388)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:29.678637 711557 usertrap_amd64.go:212] [ 1554(16388): 1554(16388)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:29.678703 711557 usertrap_amd64.go:122] [ 1554(16388): 1554(16388)] Allocate a new trap: 0xc0004754a0 41 D0706 16:21:29.678827 711557 usertrap_amd64.go:225] [ 1554(16388): 1554(16388)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:29.679751 711557 usertrap_amd64.go:212] [ 1555(15751): 1555(15751)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:29.680716 711557 usertrap_amd64.go:122] [ 1555(15751): 1555(15751)] Allocate a new trap: 0xc2f1c5e2d0 41 D0706 16:21:29.681108 711557 usertrap_amd64.go:225] [ 1555(15751): 1555(15751)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:29.698143 711557 usertrap_amd64.go:212] [ 1556(17859): 1556(17859)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:29.698257 711557 usertrap_amd64.go:122] [ 1556(17859): 1556(17859)] Allocate a new trap: 0xc2f1c5e300 40 D0706 16:21:29.700254 711557 usertrap_amd64.go:225] [ 1556(17859): 1556(17859)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:29.700931 711557 usertrap_amd64.go:212] [ 1554(16388): 1554(16388)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:29.701065 711557 usertrap_amd64.go:122] [ 1554(16388): 1554(16388)] Allocate a new trap: 0xc0004754a0 42 D0706 16:21:29.701139 711557 usertrap_amd64.go:225] [ 1554(16388): 1554(16388)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:29.705625 711557 usertrap_amd64.go:212] [ 1556(17859): 1556(17859)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:29.705992 711557 usertrap_amd64.go:122] [ 1556(17859): 1556(17859)] Allocate a new trap: 0xc2f1c5e300 41 D0706 16:21:29.706196 711557 usertrap_amd64.go:225] [ 1556(17859): 1556(17859)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:29.708491 711557 usertrap_amd64.go:212] [ 1554(16388): 1557(16389)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:29.708560 711557 usertrap_amd64.go:122] [ 1554(16388): 1557(16389)] Allocate a new trap: 0xc0004754a0 43 D0706 16:21:29.708727 711557 usertrap_amd64.go:225] [ 1554(16388): 1557(16389)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:29.721513 711557 usertrap_amd64.go:212] [ 1554(16388): 1554(16388)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:29.721583 711557 usertrap_amd64.go:122] [ 1554(16388): 1554(16388)] Allocate a new trap: 0xc0004754a0 44 D0706 16:21:29.721646 711557 usertrap_amd64.go:225] [ 1554(16388): 1554(16388)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:29.721720 711557 usertrap_amd64.go:212] [ 1555(15751): 1555(15751)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:29.721788 711557 usertrap_amd64.go:122] [ 1555(15751): 1555(15751)] Allocate a new trap: 0xc2f1c5e2d0 42 D0706 16:21:29.721920 711557 usertrap_amd64.go:225] [ 1555(15751): 1555(15751)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:29.724165 711557 task_signals.go:204] [ 1554(16388): 1557(16389)] Signal 1554, PID: 1557, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.724198 711557 task_signals.go:204] [ 1554(16388): 1559(16391)] Signal 1554, PID: 1559, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.725061 711557 task_exit.go:204] [ 1554(16388): 1554(16388)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.725403 711557 task_exit.go:204] [ 1554(16388): 1559(16391)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.725823 711557 task_signals.go:204] [ 1554(16388): 1558(16390)] Signal 1554, PID: 1558, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:29.726180 711557 task_exit.go:204] [ 1554(16388): 1559(16391)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.726391 711557 task_exit.go:204] [ 1554(16388): 1559(16391)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.726665 711557 task_exit.go:204] [ 1554(16388): 1558(16390)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.727011 711557 task_exit.go:204] [ 1554(16388): 1558(16390)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.727103 711557 task_exit.go:204] [ 1554(16388): 1558(16390)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.727255 711557 task_exit.go:204] [ 1554(16388): 1557(16389)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:29.727721 711557 task_exit.go:204] [ 1554(16388): 1557(16389)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.727770 711557 task_exit.go:204] [ 1554(16388): 1557(16389)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:29.735613 711557 task_exit.go:204] [ 1554(16388): 1554(16388)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:29.735771 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:29.736533 711557 task_exit.go:204] [ 1554(16388): 1554(16388)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:29 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100, 0x4) D0706 16:21:29.741552 711557 usertrap_amd64.go:212] [ 1555(15751): 1560(15752)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:29.741611 711557 usertrap_amd64.go:122] [ 1555(15751): 1560(15752)] Allocate a new trap: 0xc2f1c5e2d0 43 D0706 16:21:29.741706 711557 usertrap_amd64.go:225] [ 1555(15751): 1560(15752)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:29.750939 711557 usertrap_amd64.go:212] [ 1556(17859): 1556(17859)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:29.751022 711557 usertrap_amd64.go:122] [ 1556(17859): 1556(17859)] Allocate a new trap: 0xc2f1c5e300 42 D0706 16:21:29.751119 711557 usertrap_amd64.go:225] [ 1556(17859): 1556(17859)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:29.766682 711557 usertrap_amd64.go:212] [ 1556(17859): 1556(17859)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:29.766766 711557 usertrap_amd64.go:122] [ 1556(17859): 1556(17859)] Allocate a new trap: 0xc2f1c5e300 43 D0706 16:21:29.766851 711557 usertrap_amd64.go:225] [ 1556(17859): 1556(17859)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:29.767746 711557 usertrap_amd64.go:212] [ 1562(16392): 1562(16392)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:29.767813 711557 usertrap_amd64.go:122] [ 1562(16392): 1562(16392)] Allocate a new trap: 0xc0038eda40 40 D0706 16:21:29.768548 711557 usertrap_amd64.go:225] [ 1562(16392): 1562(16392)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:29.775154 711557 usertrap_amd64.go:212] [ 1562(16392): 1562(16392)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:29.775223 711557 usertrap_amd64.go:122] [ 1562(16392): 1562(16392)] Allocate a new trap: 0xc0038eda40 41 D0706 16:21:29.775292 711557 usertrap_amd64.go:225] [ 1562(16392): 1562(16392)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:29.818823 711557 usertrap_amd64.go:212] [ 1555(15751): 1555(15751)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:29.818950 711557 usertrap_amd64.go:122] [ 1555(15751): 1555(15751)] Allocate a new trap: 0xc2f1c5e2d0 44 D0706 16:21:29.819017 711557 usertrap_amd64.go:225] [ 1555(15751): 1555(15751)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:29.935224 711557 usertrap_amd64.go:212] [ 1541(16987): 1541(16987)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:29.935322 711557 usertrap_amd64.go:122] [ 1541(16987): 1541(16987)] Allocate a new trap: 0xc0038ed920 45 D0706 16:21:29.935422 711557 usertrap_amd64.go:225] [ 1541(16987): 1541(16987)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:30.243309 711557 usertrap_amd64.go:212] [ 1556(17859): 1556(17859)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:30.243448 711557 usertrap_amd64.go:122] [ 1556(17859): 1556(17859)] Allocate a new trap: 0xc2f1c5e300 44 D0706 16:21:30.243560 711557 usertrap_amd64.go:225] [ 1556(17859): 1556(17859)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:30.243566 711557 task_signals.go:204] [ 1541(16987): 1552(16989)] Signal 1541, PID: 1552, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.243651 711557 task_exit.go:204] [ 1541(16987): 1541(16987)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.243951 711557 task_exit.go:204] [ 1541(16987): 1541(16987)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.243941 711557 task_signals.go:204] [ 1541(16987): 1544(16988)] Signal 1541, PID: 1544, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.244036 711557 task_exit.go:204] [ 1541(16987): 1552(16989)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.244381 711557 task_exit.go:204] [ 1541(16987): 1552(16989)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.244442 711557 task_exit.go:204] [ 1541(16987): 1552(16989)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.244679 711557 task_exit.go:204] [ 1541(16987): 1544(16988)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.251334 711557 task_exit.go:204] [ 1556(17859): 1556(17859)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.251591 711557 task_signals.go:204] [ 1556(17859): 1561(17860)] Signal 1556, PID: 1561, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.251654 711557 task_signals.go:204] [ 1556(17859): 1564(17862)] Signal 1556, PID: 1564, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.251729 711557 task_signals.go:204] [ 1556(17859): 1563(17861)] Signal 1556, PID: 1563, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.251783 711557 task_exit.go:204] [ 1556(17859): 1556(17859)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.252057 711557 task_exit.go:204] [ 1556(17859): 1561(17860)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.252285 711557 task_exit.go:204] [ 1556(17859): 1561(17860)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.252340 711557 task_exit.go:204] [ 1556(17859): 1561(17860)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.252490 711557 task_exit.go:204] [ 1556(17859): 1564(17862)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.252686 711557 task_exit.go:204] [ 1556(17859): 1564(17862)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.252763 711557 task_exit.go:204] [ 1556(17859): 1564(17862)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.252867 711557 task_exit.go:204] [ 1556(17859): 1563(17861)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.256402 711557 task_exit.go:204] [ 1541(16987): 1544(16988)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.256485 711557 task_exit.go:204] [ 1541(16987): 1544(16988)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.256579 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:30.257788 711557 task_exit.go:204] [ 1541(16987): 1541(16987)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.258093 711557 usertrap_amd64.go:212] [ 1562(16392): 1562(16392)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:30.258178 711557 usertrap_amd64.go:122] [ 1562(16392): 1562(16392)] Allocate a new trap: 0xc0038eda40 42 D0706 16:21:30.258286 711557 usertrap_amd64.go:225] [ 1562(16392): 1562(16392)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) 16:21:30 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) nanosleep(&(0x7f0000001dc0)={0x77359400}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:30.263279 711557 task_exit.go:204] [ 1556(17859): 1563(17861)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.263464 711557 task_exit.go:204] [ 1556(17859): 1563(17861)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.263688 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:30.263868 711557 task_exit.go:204] [ 1556(17859): 1556(17859)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:30 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) fallocate(r0, 0x9, 0xb6a3, 0x7) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:30.331311 711557 usertrap_amd64.go:212] [ 1562(16392): 1562(16392)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:30.331453 711557 usertrap_amd64.go:122] [ 1562(16392): 1562(16392)] Allocate a new trap: 0xc0038eda40 43 D0706 16:21:30.331530 711557 usertrap_amd64.go:225] [ 1562(16392): 1562(16392)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:30.336519 711557 task_exit.go:204] [ 1562(16392): 1562(16392)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.337025 711557 task_signals.go:204] [ 1562(16392): 1566(16393)] Signal 1562, PID: 1566, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.337134 711557 task_exit.go:204] [ 1562(16392): 1566(16393)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.337418 711557 task_exit.go:204] [ 1562(16392): 1566(16393)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.337478 711557 task_exit.go:204] [ 1562(16392): 1566(16393)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.347157 711557 task_exit.go:204] [ 1562(16392): 1562(16392)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.347356 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:30.348820 711557 task_exit.go:204] [ 1562(16392): 1562(16392)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100, 0x4) socket(0xa, 0x1, 0x0) (async) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100, 0x4) (async) D0706 16:21:30.363034 711557 usertrap_amd64.go:212] [ 1567(17863): 1567(17863)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:30.363135 711557 usertrap_amd64.go:122] [ 1567(17863): 1567(17863)] Allocate a new trap: 0xc008918b40 40 D0706 16:21:30.364008 711557 usertrap_amd64.go:225] [ 1567(17863): 1567(17863)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:30.367820 711557 usertrap_amd64.go:212] [ 1567(17863): 1567(17863)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:30.367892 711557 usertrap_amd64.go:122] [ 1567(17863): 1567(17863)] Allocate a new trap: 0xc008918b40 41 D0706 16:21:30.367955 711557 usertrap_amd64.go:225] [ 1567(17863): 1567(17863)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:30.376720 711557 usertrap_amd64.go:212] [ 1568(16990): 1568(16990)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:30.376861 711557 usertrap_amd64.go:122] [ 1568(16990): 1568(16990)] Allocate a new trap: 0xc173599320 40 D0706 16:21:30.377862 711557 usertrap_amd64.go:225] [ 1568(16990): 1568(16990)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:30.383666 711557 usertrap_amd64.go:212] [ 1568(16990): 1568(16990)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:30.383818 711557 usertrap_amd64.go:122] [ 1568(16990): 1568(16990)] Allocate a new trap: 0xc173599320 41 D0706 16:21:30.384016 711557 usertrap_amd64.go:225] [ 1568(16990): 1568(16990)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:30.392383 711557 usertrap_amd64.go:212] [ 1567(17863): 1567(17863)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:30.392470 711557 usertrap_amd64.go:122] [ 1567(17863): 1567(17863)] Allocate a new trap: 0xc008918b40 42 D0706 16:21:30.392542 711557 usertrap_amd64.go:225] [ 1567(17863): 1567(17863)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:30.401974 711557 usertrap_amd64.go:212] [ 1569(16394): 1569(16394)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:30.402064 711557 usertrap_amd64.go:122] [ 1569(16394): 1569(16394)] Allocate a new trap: 0xc1e5771950 40 D0706 16:21:30.403547 711557 usertrap_amd64.go:225] [ 1569(16394): 1569(16394)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:30.410889 711557 usertrap_amd64.go:212] [ 1569(16394): 1569(16394)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:30.411091 711557 usertrap_amd64.go:122] [ 1569(16394): 1569(16394)] Allocate a new trap: 0xc1e5771950 41 D0706 16:21:30.411265 711557 usertrap_amd64.go:225] [ 1569(16394): 1569(16394)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:30.418550 711557 usertrap_amd64.go:212] [ 1568(16990): 1568(16990)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:30.418651 711557 usertrap_amd64.go:122] [ 1568(16990): 1568(16990)] Allocate a new trap: 0xc173599320 42 D0706 16:21:30.418771 711557 usertrap_amd64.go:225] [ 1568(16990): 1568(16990)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:30.425925 711557 usertrap_amd64.go:212] [ 1568(16990): 1572(16991)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:30.426033 711557 usertrap_amd64.go:122] [ 1568(16990): 1572(16991)] Allocate a new trap: 0xc173599320 43 D0706 16:21:30.426137 711557 usertrap_amd64.go:225] [ 1568(16990): 1572(16991)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:30.431619 711557 usertrap_amd64.go:212] [ 1569(16394): 1569(16394)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:30.431699 711557 usertrap_amd64.go:122] [ 1569(16394): 1569(16394)] Allocate a new trap: 0xc1e5771950 42 D0706 16:21:30.431762 711557 usertrap_amd64.go:225] [ 1569(16394): 1569(16394)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:30.443701 711557 usertrap_amd64.go:212] [ 1569(16394): 1569(16394)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:30.443768 711557 usertrap_amd64.go:122] [ 1569(16394): 1569(16394)] Allocate a new trap: 0xc1e5771950 43 D0706 16:21:30.443868 711557 usertrap_amd64.go:225] [ 1569(16394): 1569(16394)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:30.445918 711557 usertrap_amd64.go:212] [ 1569(16394): 1569(16394)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:30.445998 711557 usertrap_amd64.go:122] [ 1569(16394): 1569(16394)] Allocate a new trap: 0xc1e5771950 44 D0706 16:21:30.446106 711557 usertrap_amd64.go:225] [ 1569(16394): 1569(16394)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:30.450833 711557 task_exit.go:204] [ 1569(16394): 1569(16394)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.451116 711557 task_exit.go:204] [ 1569(16394): 1569(16394)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.451272 711557 task_signals.go:204] [ 1569(16394): 1573(16395)] Signal 1569, PID: 1573, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.451348 711557 task_exit.go:204] [ 1569(16394): 1573(16395)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.451517 711557 task_exit.go:204] [ 1569(16394): 1573(16395)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.451574 711557 task_exit.go:204] [ 1569(16394): 1573(16395)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.451855 711557 task_signals.go:204] [ 1569(16394): 1574(16396)] Signal 1569, PID: 1574, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.451955 711557 task_exit.go:204] [ 1569(16394): 1574(16396)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.461072 711557 task_exit.go:204] [ 1569(16394): 1574(16396)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.461478 711557 task_exit.go:204] [ 1569(16394): 1574(16396)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.461689 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:30.462301 711557 task_exit.go:204] [ 1569(16394): 1569(16394)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100, 0x4) socket(0xa, 0x1, 0x0) (async) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100, 0x4) (async) D0706 16:21:30.527318 711557 usertrap_amd64.go:212] [ 1555(15751): 1555(15751)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:30.527391 711557 usertrap_amd64.go:122] [ 1555(15751): 1555(15751)] Allocate a new trap: 0xc2f1c5e2d0 45 D0706 16:21:30.527485 711557 usertrap_amd64.go:225] [ 1555(15751): 1555(15751)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:30.530020 711557 task_exit.go:204] [ 1555(15751): 1555(15751)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.530215 711557 task_exit.go:204] [ 1555(15751): 1555(15751)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.530397 711557 task_signals.go:204] [ 1555(15751): 1560(15752)] Signal 1555, PID: 1560, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.530519 711557 task_exit.go:204] [ 1555(15751): 1560(15752)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.530697 711557 task_exit.go:204] [ 1555(15751): 1560(15752)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.530783 711557 task_exit.go:204] [ 1555(15751): 1560(15752)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.531038 711557 task_signals.go:204] [ 1555(15751): 1565(15753)] Signal 1555, PID: 1565, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.531120 711557 task_exit.go:204] [ 1555(15751): 1565(15753)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.539355 711557 task_exit.go:204] [ 1555(15751): 1565(15753)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.539462 711557 task_exit.go:204] [ 1555(15751): 1565(15753)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.539570 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:30.539704 711557 task_exit.go:204] [ 1555(15751): 1555(15751)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:30 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:30.568138 711557 usertrap_amd64.go:212] [ 1567(17863): 1567(17863)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:30.568256 711557 usertrap_amd64.go:122] [ 1567(17863): 1567(17863)] Allocate a new trap: 0xc008918b40 43 D0706 16:21:30.568336 711557 usertrap_amd64.go:225] [ 1567(17863): 1567(17863)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:30.701173 711557 usertrap_amd64.go:212] [ 1568(16990): 1568(16990)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:30.701300 711557 usertrap_amd64.go:122] [ 1568(16990): 1568(16990)] Allocate a new trap: 0xc173599320 44 D0706 16:21:30.701378 711557 usertrap_amd64.go:225] [ 1568(16990): 1568(16990)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:30.960646 711557 usertrap_amd64.go:212] [ 1567(17863): 1567(17863)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:30.960722 711557 usertrap_amd64.go:122] [ 1567(17863): 1567(17863)] Allocate a new trap: 0xc008918b40 44 D0706 16:21:30.960826 711557 usertrap_amd64.go:225] [ 1567(17863): 1567(17863)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:30.967478 711557 task_signals.go:204] [ 1567(17863): 1570(17864)] Signal 1567, PID: 1570, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.967551 711557 task_signals.go:204] [ 1567(17863): 1571(17865)] Signal 1567, PID: 1571, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.967628 711557 task_exit.go:204] [ 1567(17863): 1567(17863)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.967944 711557 task_exit.go:204] [ 1567(17863): 1571(17865)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.968170 711557 task_signals.go:204] [ 1567(17863): 1576(17866)] Signal 1567, PID: 1576, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:30.968264 711557 task_exit.go:204] [ 1567(17863): 1571(17865)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.968334 711557 task_exit.go:204] [ 1567(17863): 1571(17865)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.968514 711557 task_exit.go:204] [ 1567(17863): 1570(17864)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.968694 711557 task_exit.go:204] [ 1567(17863): 1570(17864)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.968741 711557 task_exit.go:204] [ 1567(17863): 1570(17864)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.968840 711557 task_exit.go:204] [ 1567(17863): 1576(17866)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:30.969108 711557 task_exit.go:204] [ 1567(17863): 1576(17866)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.969190 711557 task_exit.go:204] [ 1567(17863): 1576(17866)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:30.981268 711557 task_exit.go:204] [ 1567(17863): 1567(17863)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:30.981411 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:30.982445 711557 task_exit.go:204] [ 1567(17863): 1567(17863)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:30 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) statx(r0, &(0x7f0000000100)='./bus\x00', 0x400, 0x100, 0x0) D0706 16:21:31.077572 711557 usertrap_amd64.go:212] [ 1580(16397): 1580(16397)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:31.077735 711557 usertrap_amd64.go:122] [ 1580(16397): 1580(16397)] Allocate a new trap: 0xc2f1c5e390 40 D0706 16:21:31.078923 711557 usertrap_amd64.go:225] [ 1580(16397): 1580(16397)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:31.081512 711557 usertrap_amd64.go:212] [ 1581(15754): 1581(15754)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:31.081663 711557 usertrap_amd64.go:122] [ 1581(15754): 1581(15754)] Allocate a new trap: 0xc16ed8f3e0 40 D0706 16:21:31.082761 711557 usertrap_amd64.go:225] [ 1581(15754): 1581(15754)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:31.087432 711557 usertrap_amd64.go:212] [ 1581(15754): 1581(15754)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:31.087529 711557 usertrap_amd64.go:122] [ 1581(15754): 1581(15754)] Allocate a new trap: 0xc16ed8f3e0 41 D0706 16:21:31.087620 711557 usertrap_amd64.go:225] [ 1581(15754): 1581(15754)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:31.088903 711557 usertrap_amd64.go:212] [ 1580(16397): 1580(16397)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:31.089051 711557 usertrap_amd64.go:122] [ 1580(16397): 1580(16397)] Allocate a new trap: 0xc2f1c5e390 41 D0706 16:21:31.089108 711557 usertrap_amd64.go:225] [ 1580(16397): 1580(16397)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:31.097255 711557 usertrap_amd64.go:212] [ 1582(17867): 1582(17867)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:31.097436 711557 usertrap_amd64.go:122] [ 1582(17867): 1582(17867)] Allocate a new trap: 0xc0038edaa0 40 D0706 16:21:31.098292 711557 usertrap_amd64.go:225] [ 1582(17867): 1582(17867)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:31.103488 711557 usertrap_amd64.go:212] [ 1582(17867): 1582(17867)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:31.103577 711557 usertrap_amd64.go:122] [ 1582(17867): 1582(17867)] Allocate a new trap: 0xc0038edaa0 41 D0706 16:21:31.103654 711557 usertrap_amd64.go:225] [ 1582(17867): 1582(17867)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:31.115048 711557 usertrap_amd64.go:212] [ 1580(16397): 1580(16397)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:31.116025 711557 usertrap_amd64.go:122] [ 1580(16397): 1580(16397)] Allocate a new trap: 0xc2f1c5e390 42 D0706 16:21:31.116178 711557 usertrap_amd64.go:225] [ 1580(16397): 1580(16397)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:31.125303 711557 usertrap_amd64.go:212] [ 1582(17867): 1582(17867)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:31.125373 711557 usertrap_amd64.go:122] [ 1582(17867): 1582(17867)] Allocate a new trap: 0xc0038edaa0 42 D0706 16:21:31.125453 711557 usertrap_amd64.go:225] [ 1582(17867): 1582(17867)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:31.127133 711557 usertrap_amd64.go:212] [ 1581(15754): 1581(15754)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:31.127209 711557 usertrap_amd64.go:122] [ 1581(15754): 1581(15754)] Allocate a new trap: 0xc16ed8f3e0 42 D0706 16:21:31.127340 711557 usertrap_amd64.go:225] [ 1581(15754): 1581(15754)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:31.136127 711557 usertrap_amd64.go:212] [ 1580(16397): 1580(16397)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:31.136198 711557 usertrap_amd64.go:122] [ 1580(16397): 1580(16397)] Allocate a new trap: 0xc2f1c5e390 43 D0706 16:21:31.136328 711557 usertrap_amd64.go:225] [ 1580(16397): 1580(16397)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:31.138866 711557 usertrap_amd64.go:212] [ 1580(16397): 1580(16397)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:31.138958 711557 usertrap_amd64.go:122] [ 1580(16397): 1580(16397)] Allocate a new trap: 0xc2f1c5e390 44 D0706 16:21:31.139029 711557 usertrap_amd64.go:225] [ 1580(16397): 1580(16397)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:31.142378 711557 usertrap_amd64.go:212] [ 1581(15754): 1585(15755)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:31.142451 711557 usertrap_amd64.go:122] [ 1581(15754): 1585(15755)] Allocate a new trap: 0xc16ed8f3e0 43 D0706 16:21:31.142523 711557 usertrap_amd64.go:225] [ 1581(15754): 1585(15755)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:31.157437 711557 task_exit.go:204] [ 1580(16397): 1580(16397)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.157800 711557 task_exit.go:204] [ 1580(16397): 1580(16397)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.157972 711557 task_signals.go:204] [ 1580(16397): 1583(16398)] Signal 1580, PID: 1583, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.158132 711557 task_signals.go:204] [ 1580(16397): 1586(16399)] Signal 1580, PID: 1586, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.158178 711557 task_exit.go:204] [ 1580(16397): 1583(16398)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.158312 711557 task_exit.go:204] [ 1580(16397): 1586(16399)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.158672 711557 task_exit.go:204] [ 1580(16397): 1586(16399)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.158784 711557 task_exit.go:204] [ 1580(16397): 1586(16399)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.165418 711557 task_exit.go:204] [ 1580(16397): 1583(16398)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.165511 711557 task_exit.go:204] [ 1580(16397): 1583(16398)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.165600 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:31.169837 711557 task_exit.go:204] [ 1580(16397): 1580(16397)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:31 executing program 1: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) D0706 16:21:31.205175 711557 usertrap_amd64.go:212] [ 1588(16400): 1588(16400)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:31.205372 711557 usertrap_amd64.go:122] [ 1588(16400): 1588(16400)] Allocate a new trap: 0xc00c2111a0 40 D0706 16:21:31.206213 711557 usertrap_amd64.go:225] [ 1588(16400): 1588(16400)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:31.209625 711557 usertrap_amd64.go:212] [ 1588(16400): 1588(16400)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:31.209806 711557 usertrap_amd64.go:122] [ 1588(16400): 1588(16400)] Allocate a new trap: 0xc00c2111a0 41 D0706 16:21:31.210017 711557 usertrap_amd64.go:225] [ 1588(16400): 1588(16400)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:31.212023 711557 usertrap_amd64.go:212] [ 1581(15754): 1581(15754)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:31.212224 711557 usertrap_amd64.go:122] [ 1581(15754): 1581(15754)] Allocate a new trap: 0xc16ed8f3e0 44 D0706 16:21:31.212341 711557 usertrap_amd64.go:225] [ 1581(15754): 1581(15754)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:31.239165 711557 usertrap_amd64.go:212] [ 1568(16990): 1568(16990)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:31.239260 711557 usertrap_amd64.go:122] [ 1568(16990): 1568(16990)] Allocate a new trap: 0xc173599320 45 D0706 16:21:31.239333 711557 usertrap_amd64.go:225] [ 1568(16990): 1568(16990)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:31.244278 711557 usertrap_amd64.go:212] [ 1582(17867): 1590(17870)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:31.244372 711557 usertrap_amd64.go:122] [ 1582(17867): 1590(17870)] Allocate a new trap: 0xc0038edaa0 43 D0706 16:21:31.244450 711557 usertrap_amd64.go:225] [ 1582(17867): 1590(17870)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:31.252396 711557 usertrap_amd64.go:212] [ 1582(17867): 1582(17867)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:31.252531 711557 usertrap_amd64.go:122] [ 1582(17867): 1582(17867)] Allocate a new trap: 0xc0038edaa0 44 D0706 16:21:31.252608 711557 usertrap_amd64.go:225] [ 1582(17867): 1582(17867)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:31.662787 711557 usertrap_amd64.go:212] [ 1582(17867): 1582(17867)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:31.662937 711557 usertrap_amd64.go:122] [ 1582(17867): 1582(17867)] Allocate a new trap: 0xc0038edaa0 45 D0706 16:21:31.663043 711557 usertrap_amd64.go:225] [ 1582(17867): 1582(17867)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:31.666821 711557 task_exit.go:204] [ 1568(16990): 1568(16990)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.667133 711557 task_signals.go:204] [ 1568(16990): 1575(16992)] Signal 1568, PID: 1575, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.667121 711557 task_signals.go:204] [ 1568(16990): 1579(16995)] Signal 1568, PID: 1579, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.667253 711557 task_signals.go:204] [ 1568(16990): 1572(16991)] Signal 1568, PID: 1572, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.667252 711557 task_signals.go:204] [ 1568(16990): 1577(16993)] Signal 1568, PID: 1577, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.667348 711557 task_exit.go:204] [ 1568(16990): 1579(16995)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.667525 711557 task_signals.go:204] [ 1568(16990): 1578(16994)] Signal 1568, PID: 1578, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.667689 711557 task_exit.go:204] [ 1568(16990): 1568(16990)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.667786 711557 task_exit.go:204] [ 1568(16990): 1572(16991)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.668069 711557 task_exit.go:204] [ 1568(16990): 1572(16991)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.668127 711557 task_exit.go:204] [ 1568(16990): 1572(16991)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.668366 711557 task_exit.go:204] [ 1568(16990): 1575(16992)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.668622 711557 task_exit.go:204] [ 1568(16990): 1575(16992)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.668688 711557 task_exit.go:204] [ 1568(16990): 1575(16992)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.668978 711557 task_exit.go:204] [ 1568(16990): 1579(16995)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.669075 711557 task_exit.go:204] [ 1568(16990): 1579(16995)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.669175 711557 task_exit.go:204] [ 1568(16990): 1578(16994)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.669348 711557 task_exit.go:204] [ 1568(16990): 1578(16994)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.669400 711557 task_exit.go:204] [ 1568(16990): 1578(16994)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.669499 711557 task_exit.go:204] [ 1568(16990): 1577(16993)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.671015 711557 task_exit.go:204] [ 1582(17867): 1582(17867)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.671403 711557 task_signals.go:204] [ 1582(17867): 1587(17869)] Signal 1582, PID: 1587, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.671421 711557 task_signals.go:204] [ 1582(17867): 1590(17870)] Signal 1582, PID: 1590, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.671505 711557 task_exit.go:204] [ 1582(17867): 1587(17869)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.671701 711557 task_signals.go:204] [ 1582(17867): 1584(17868)] Signal 1582, PID: 1584, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.671955 711557 task_exit.go:204] [ 1582(17867): 1582(17867)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.672034 711557 task_exit.go:204] [ 1582(17867): 1590(17870)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.672195 711557 task_exit.go:204] [ 1582(17867): 1590(17870)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.672258 711557 task_exit.go:204] [ 1582(17867): 1590(17870)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.672355 711557 task_exit.go:204] [ 1582(17867): 1584(17868)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.672513 711557 task_exit.go:204] [ 1582(17867): 1587(17869)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.672574 711557 task_exit.go:204] [ 1582(17867): 1587(17869)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.680844 711557 task_exit.go:204] [ 1568(16990): 1577(16993)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.683180 711557 task_exit.go:204] [ 1568(16990): 1577(16993)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.683442 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:31.684204 711557 task_exit.go:204] [ 1582(17867): 1584(17868)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.684306 711557 task_exit.go:204] [ 1582(17867): 1584(17868)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.684399 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:31.685082 711557 task_exit.go:204] [ 1568(16990): 1568(16990)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.685934 711557 task_exit.go:204] [ 1582(17867): 1582(17867)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:31 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:31 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) statx(r0, &(0x7f0000000100)='./bus\x00', 0x400, 0x100, 0x0) D0706 16:21:31.764876 711557 usertrap_amd64.go:212] [ 1588(16400): 1588(16400)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:31.765130 711557 usertrap_amd64.go:122] [ 1588(16400): 1588(16400)] Allocate a new trap: 0xc00c2111a0 42 D0706 16:21:31.765427 711557 usertrap_amd64.go:225] [ 1588(16400): 1588(16400)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:31.782725 711557 usertrap_amd64.go:212] [ 1591(16996): 1591(16996)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:31.782832 711557 usertrap_amd64.go:122] [ 1591(16996): 1591(16996)] Allocate a new trap: 0xc017060090 40 D0706 16:21:31.783902 711557 usertrap_amd64.go:225] [ 1591(16996): 1591(16996)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:31.788273 711557 usertrap_amd64.go:212] [ 1593(17871): 1593(17871)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:31.788432 711557 usertrap_amd64.go:122] [ 1593(17871): 1593(17871)] Allocate a new trap: 0xc16ed8f470 40 D0706 16:21:31.789192 711557 usertrap_amd64.go:225] [ 1593(17871): 1593(17871)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:31.790983 711557 usertrap_amd64.go:212] [ 1591(16996): 1591(16996)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:31.791040 711557 usertrap_amd64.go:122] [ 1591(16996): 1591(16996)] Allocate a new trap: 0xc017060090 41 D0706 16:21:31.791188 711557 usertrap_amd64.go:225] [ 1591(16996): 1591(16996)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:31.794817 711557 usertrap_amd64.go:212] [ 1593(17871): 1593(17871)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:31.794897 711557 usertrap_amd64.go:122] [ 1593(17871): 1593(17871)] Allocate a new trap: 0xc16ed8f470 41 D0706 16:21:31.795019 711557 usertrap_amd64.go:225] [ 1593(17871): 1593(17871)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:31.797400 711557 usertrap_amd64.go:212] [ 1588(16400): 1588(16400)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:31.797493 711557 usertrap_amd64.go:122] [ 1588(16400): 1588(16400)] Allocate a new trap: 0xc00c2111a0 43 D0706 16:21:31.797540 711557 usertrap_amd64.go:225] [ 1588(16400): 1588(16400)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:31.807641 711557 task_exit.go:204] [ 1588(16400): 1588(16400)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.807878 711557 task_exit.go:204] [ 1588(16400): 1588(16400)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.808085 711557 task_signals.go:204] [ 1588(16400): 1592(16401)] Signal 1588, PID: 1592, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.808202 711557 task_exit.go:204] [ 1588(16400): 1592(16401)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.816125 711557 task_exit.go:204] [ 1588(16400): 1592(16401)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.816187 711557 task_exit.go:204] [ 1588(16400): 1592(16401)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.816299 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:31.816394 711557 task_exit.go:204] [ 1588(16400): 1588(16400)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:31 executing program 1: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 64) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 64) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 64) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (rerun: 64) D0706 16:21:31.822321 711557 usertrap_amd64.go:212] [ 1591(16996): 1591(16996)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:31.822548 711557 usertrap_amd64.go:122] [ 1591(16996): 1591(16996)] Allocate a new trap: 0xc017060090 42 D0706 16:21:31.822739 711557 usertrap_amd64.go:225] [ 1591(16996): 1591(16996)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:31.832632 711557 usertrap_amd64.go:212] [ 1591(16996): 1594(16997)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:31.832693 711557 usertrap_amd64.go:122] [ 1591(16996): 1594(16997)] Allocate a new trap: 0xc017060090 43 D0706 16:21:31.832748 711557 usertrap_amd64.go:225] [ 1591(16996): 1594(16997)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:31.833380 711557 usertrap_amd64.go:212] [ 1593(17871): 1593(17871)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:31.833466 711557 usertrap_amd64.go:122] [ 1593(17871): 1593(17871)] Allocate a new trap: 0xc16ed8f470 42 D0706 16:21:31.833535 711557 usertrap_amd64.go:225] [ 1593(17871): 1593(17871)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:31.848492 711557 usertrap_amd64.go:212] [ 1591(16996): 1591(16996)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:31.848646 711557 usertrap_amd64.go:122] [ 1591(16996): 1591(16996)] Allocate a new trap: 0xc017060090 44 D0706 16:21:31.848734 711557 usertrap_amd64.go:225] [ 1591(16996): 1591(16996)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:31.852188 711557 usertrap_amd64.go:212] [ 1593(17871): 1599(17875)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:31.852287 711557 usertrap_amd64.go:122] [ 1593(17871): 1599(17875)] Allocate a new trap: 0xc16ed8f470 43 D0706 16:21:31.852355 711557 usertrap_amd64.go:225] [ 1593(17871): 1599(17875)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:31.852886 711557 task_exit.go:204] [ 1591(16996): 1591(16996)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.853367 711557 task_exit.go:204] [ 1591(16996): 1591(16996)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.853770 711557 task_signals.go:204] [ 1591(16996): 1594(16997)] Signal 1591, PID: 1594, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.853933 711557 task_exit.go:204] [ 1591(16996): 1594(16997)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.862488 711557 usertrap_amd64.go:212] [ 1593(17871): 1593(17871)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:31.862574 711557 usertrap_amd64.go:122] [ 1593(17871): 1593(17871)] Allocate a new trap: 0xc16ed8f470 44 D0706 16:21:31.862656 711557 usertrap_amd64.go:225] [ 1593(17871): 1593(17871)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:31.863047 711557 task_exit.go:204] [ 1591(16996): 1594(16997)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.863117 711557 task_exit.go:204] [ 1591(16996): 1594(16997)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.863240 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:31.865069 711557 task_exit.go:204] [ 1591(16996): 1591(16996)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:31 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:31.868960 711557 usertrap_amd64.go:212] [ 1596(16402): 1596(16402)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:31.869221 711557 usertrap_amd64.go:122] [ 1596(16402): 1596(16402)] Allocate a new trap: 0xc000475590 40 D0706 16:21:31.870137 711557 usertrap_amd64.go:225] [ 1596(16402): 1596(16402)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:31.875224 711557 usertrap_amd64.go:212] [ 1596(16402): 1596(16402)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:31.877014 711557 usertrap_amd64.go:122] [ 1596(16402): 1596(16402)] Allocate a new trap: 0xc000475590 41 D0706 16:21:31.877117 711557 usertrap_amd64.go:225] [ 1596(16402): 1596(16402)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:31.937061 711557 usertrap_amd64.go:212] [ 1581(15754): 1581(15754)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:31.937166 711557 usertrap_amd64.go:122] [ 1581(15754): 1581(15754)] Allocate a new trap: 0xc16ed8f3e0 45 D0706 16:21:31.937258 711557 usertrap_amd64.go:225] [ 1581(15754): 1581(15754)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:31.939897 711557 task_exit.go:204] [ 1581(15754): 1581(15754)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.940150 711557 task_exit.go:204] [ 1581(15754): 1581(15754)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.940233 711557 task_signals.go:204] [ 1581(15754): 1585(15755)] Signal 1581, PID: 1585, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.940278 711557 task_signals.go:204] [ 1581(15754): 1589(15756)] Signal 1581, PID: 1589, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:31.940373 711557 task_exit.go:204] [ 1581(15754): 1585(15755)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.940710 711557 task_exit.go:204] [ 1581(15754): 1585(15755)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.940780 711557 task_exit.go:204] [ 1581(15754): 1585(15755)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.940904 711557 task_exit.go:204] [ 1581(15754): 1589(15756)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:31.949084 711557 task_exit.go:204] [ 1581(15754): 1589(15756)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:31.949164 711557 task_exit.go:204] [ 1581(15754): 1589(15756)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:31.949287 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:31.950381 711557 task_exit.go:204] [ 1581(15754): 1581(15754)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:31 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) D0706 16:21:32.261381 711557 usertrap_amd64.go:212] [ 1593(17871): 1593(17871)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:32.261482 711557 usertrap_amd64.go:122] [ 1593(17871): 1593(17871)] Allocate a new trap: 0xc16ed8f470 45 D0706 16:21:32.261563 711557 usertrap_amd64.go:225] [ 1593(17871): 1593(17871)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:32.265311 711557 task_exit.go:204] [ 1593(17871): 1593(17871)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.265696 711557 task_signals.go:204] [ 1593(17871): 1595(17872)] Signal 1593, PID: 1595, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.265802 711557 task_signals.go:204] [ 1593(17871): 1598(17874)] Signal 1593, PID: 1598, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.265824 711557 task_signals.go:204] [ 1593(17871): 1599(17875)] Signal 1593, PID: 1599, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.265893 711557 task_exit.go:204] [ 1593(17871): 1598(17874)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.265867 711557 task_signals.go:204] [ 1593(17871): 1597(17873)] Signal 1593, PID: 1597, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.265988 711557 task_exit.go:204] [ 1593(17871): 1595(17872)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.266261 711557 task_exit.go:204] [ 1593(17871): 1599(17875)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.266435 711557 task_exit.go:204] [ 1593(17871): 1597(17873)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.267055 711557 task_exit.go:204] [ 1593(17871): 1597(17873)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.267113 711557 task_exit.go:204] [ 1593(17871): 1597(17873)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.267198 711557 task_exit.go:204] [ 1593(17871): 1598(17874)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.267280 711557 task_exit.go:204] [ 1593(17871): 1598(17874)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.267569 711557 task_exit.go:204] [ 1593(17871): 1595(17872)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.267649 711557 task_exit.go:204] [ 1593(17871): 1595(17872)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.267765 711557 task_exit.go:204] [ 1593(17871): 1593(17871)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.279581 711557 task_exit.go:204] [ 1593(17871): 1599(17875)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.279651 711557 task_exit.go:204] [ 1593(17871): 1599(17875)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.279779 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:32.280066 711557 task_exit.go:204] [ 1593(17871): 1593(17871)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:32 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) statx(r0, &(0x7f0000000100)='./bus\x00', 0x400, 0x100, 0x0) (async) statx(r0, &(0x7f0000000100)='./bus\x00', 0x400, 0x100, 0x0) D0706 16:21:32.282233 711557 usertrap_amd64.go:212] [ 1596(16402): 1596(16402)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:32.282330 711557 usertrap_amd64.go:122] [ 1596(16402): 1596(16402)] Allocate a new trap: 0xc000475590 42 D0706 16:21:32.282401 711557 usertrap_amd64.go:225] [ 1596(16402): 1596(16402)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:32.347722 711557 usertrap_amd64.go:212] [ 1600(15757): 1600(15757)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:32.347937 711557 usertrap_amd64.go:122] [ 1600(15757): 1600(15757)] Allocate a new trap: 0xc16ed8f4d0 40 D0706 16:21:32.349211 711557 usertrap_amd64.go:225] [ 1600(15757): 1600(15757)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:32.352682 711557 usertrap_amd64.go:212] [ 1602(16998): 1602(16998)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:32.352780 711557 usertrap_amd64.go:122] [ 1602(16998): 1602(16998)] Allocate a new trap: 0xc00c2111d0 40 D0706 16:21:32.352822 711557 usertrap_amd64.go:212] [ 1600(15757): 1600(15757)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:32.352902 711557 usertrap_amd64.go:122] [ 1600(15757): 1600(15757)] Allocate a new trap: 0xc16ed8f4d0 41 D0706 16:21:32.353086 711557 usertrap_amd64.go:225] [ 1600(15757): 1600(15757)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:32.353628 711557 usertrap_amd64.go:225] [ 1602(16998): 1602(16998)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:32.357788 711557 usertrap_amd64.go:212] [ 1602(16998): 1602(16998)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:32.357854 711557 usertrap_amd64.go:122] [ 1602(16998): 1602(16998)] Allocate a new trap: 0xc00c2111d0 41 D0706 16:21:32.357927 711557 usertrap_amd64.go:225] [ 1602(16998): 1602(16998)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:32.369211 711557 usertrap_amd64.go:212] [ 1596(16402): 1596(16402)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:32.369274 711557 usertrap_amd64.go:122] [ 1596(16402): 1596(16402)] Allocate a new trap: 0xc000475590 43 D0706 16:21:32.369341 711557 usertrap_amd64.go:225] [ 1596(16402): 1596(16402)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:32.372450 711557 usertrap_amd64.go:212] [ 1596(16402): 1596(16402)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:32.372527 711557 usertrap_amd64.go:122] [ 1596(16402): 1596(16402)] Allocate a new trap: 0xc000475590 44 D0706 16:21:32.372592 711557 usertrap_amd64.go:225] [ 1596(16402): 1596(16402)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:32.374263 711557 usertrap_amd64.go:212] [ 1600(15757): 1600(15757)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:32.374333 711557 usertrap_amd64.go:122] [ 1600(15757): 1600(15757)] Allocate a new trap: 0xc16ed8f4d0 42 D0706 16:21:32.374462 711557 usertrap_amd64.go:225] [ 1600(15757): 1600(15757)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:32.377903 711557 usertrap_amd64.go:212] [ 1602(16998): 1602(16998)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:32.377992 711557 usertrap_amd64.go:122] [ 1602(16998): 1602(16998)] Allocate a new trap: 0xc00c2111d0 42 D0706 16:21:32.378119 711557 usertrap_amd64.go:225] [ 1602(16998): 1602(16998)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:32.379006 711557 usertrap_amd64.go:212] [ 1607(17876): 1607(17876)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:32.379082 711557 usertrap_amd64.go:122] [ 1607(17876): 1607(17876)] Allocate a new trap: 0xc00c6d2030 40 D0706 16:21:32.379773 711557 usertrap_amd64.go:225] [ 1607(17876): 1607(17876)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:32.380148 711557 task_signals.go:204] [ 1596(16402): 1605(16406)] Signal 1596, PID: 1605, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.380170 711557 task_signals.go:204] [ 1596(16402): 1606(16407)] Signal 1596, PID: 1606, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.380207 711557 task_signals.go:204] [ 1596(16402): 1604(16405)] Signal 1596, PID: 1604, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.380248 711557 task_signals.go:204] [ 1596(16402): 1601(16403)] Signal 1596, PID: 1601, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.380325 711557 task_exit.go:204] [ 1596(16402): 1605(16406)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.380454 711557 task_signals.go:204] [ 1596(16402): 1603(16404)] Signal 1596, PID: 1603, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.380633 711557 task_exit.go:204] [ 1596(16402): 1606(16407)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.380857 711557 task_exit.go:204] [ 1596(16402): 1606(16407)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.380974 711557 task_exit.go:204] [ 1596(16402): 1606(16407)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.381111 711557 task_exit.go:204] [ 1596(16402): 1604(16405)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.381285 711557 task_exit.go:204] [ 1596(16402): 1596(16402)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.381551 711557 task_exit.go:204] [ 1596(16402): 1601(16403)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.381690 711557 task_exit.go:204] [ 1596(16402): 1603(16404)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.381936 711557 task_exit.go:204] [ 1596(16402): 1596(16402)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.382112 711557 task_exit.go:204] [ 1596(16402): 1604(16405)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.382178 711557 task_exit.go:204] [ 1596(16402): 1604(16405)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.382277 711557 task_exit.go:204] [ 1596(16402): 1605(16406)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.382342 711557 task_exit.go:204] [ 1596(16402): 1605(16406)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.382422 711557 task_exit.go:204] [ 1596(16402): 1601(16403)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.382471 711557 task_exit.go:204] [ 1596(16402): 1601(16403)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.386665 711557 usertrap_amd64.go:212] [ 1600(15757): 1608(15758)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:32.386765 711557 usertrap_amd64.go:122] [ 1600(15757): 1608(15758)] Allocate a new trap: 0xc16ed8f4d0 43 D0706 16:21:32.386909 711557 usertrap_amd64.go:225] [ 1600(15757): 1608(15758)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:32.387396 711557 usertrap_amd64.go:212] [ 1607(17876): 1607(17876)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:32.387485 711557 usertrap_amd64.go:122] [ 1607(17876): 1607(17876)] Allocate a new trap: 0xc00c6d2030 41 D0706 16:21:32.387543 711557 usertrap_amd64.go:225] [ 1607(17876): 1607(17876)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:32.388786 711557 task_exit.go:204] [ 1596(16402): 1603(16404)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.388863 711557 task_exit.go:204] [ 1596(16402): 1603(16404)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.388936 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:32.389141 711557 task_exit.go:204] [ 1596(16402): 1596(16402)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:32 executing program 1: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async, rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (rerun: 32) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) (async) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) D0706 16:21:32.395135 711557 usertrap_amd64.go:212] [ 1602(16998): 1609(16999)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:32.395214 711557 usertrap_amd64.go:122] [ 1602(16998): 1609(16999)] Allocate a new trap: 0xc00c2111d0 43 D0706 16:21:32.395288 711557 usertrap_amd64.go:225] [ 1602(16998): 1609(16999)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:32.402824 711557 usertrap_amd64.go:212] [ 1602(16998): 1602(16998)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:32.402956 711557 usertrap_amd64.go:122] [ 1602(16998): 1602(16998)] Allocate a new trap: 0xc00c2111d0 44 D0706 16:21:32.403136 711557 usertrap_amd64.go:225] [ 1602(16998): 1602(16998)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:32.406753 711557 task_exit.go:204] [ 1602(16998): 1602(16998)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.407022 711557 task_exit.go:204] [ 1602(16998): 1602(16998)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.407210 711557 task_signals.go:204] [ 1602(16998): 1609(16999)] Signal 1602, PID: 1609, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.407440 711557 task_exit.go:204] [ 1602(16998): 1609(16999)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.407982 711557 usertrap_amd64.go:212] [ 1607(17876): 1607(17876)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:32.408082 711557 usertrap_amd64.go:122] [ 1607(17876): 1607(17876)] Allocate a new trap: 0xc00c6d2030 42 D0706 16:21:32.408145 711557 usertrap_amd64.go:225] [ 1607(17876): 1607(17876)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:32.415939 711557 task_exit.go:204] [ 1602(16998): 1609(16999)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.416177 711557 task_exit.go:204] [ 1602(16998): 1609(16999)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.416320 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:32.416983 711557 task_exit.go:204] [ 1602(16998): 1602(16998)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:32 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:32.427618 711557 usertrap_amd64.go:212] [ 1611(16408): 1611(16408)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:32.427734 711557 usertrap_amd64.go:122] [ 1611(16408): 1611(16408)] Allocate a new trap: 0xc00c6d20f0 40 D0706 16:21:32.428544 711557 usertrap_amd64.go:225] [ 1611(16408): 1611(16408)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:32.434792 711557 usertrap_amd64.go:212] [ 1611(16408): 1611(16408)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:32.434853 711557 usertrap_amd64.go:122] [ 1611(16408): 1611(16408)] Allocate a new trap: 0xc00c6d20f0 41 D0706 16:21:32.434907 711557 usertrap_amd64.go:225] [ 1611(16408): 1611(16408)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:32.449330 711557 usertrap_amd64.go:212] [ 1611(16408): 1611(16408)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:32.449411 711557 usertrap_amd64.go:122] [ 1611(16408): 1611(16408)] Allocate a new trap: 0xc00c6d20f0 42 D0706 16:21:32.449508 711557 usertrap_amd64.go:225] [ 1611(16408): 1611(16408)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:32.454863 711557 usertrap_amd64.go:212] [ 1613(17000): 1613(17000)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:32.454956 711557 usertrap_amd64.go:122] [ 1613(17000): 1613(17000)] Allocate a new trap: 0xc00c6d2120 40 D0706 16:21:32.455787 711557 usertrap_amd64.go:225] [ 1613(17000): 1613(17000)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:32.459802 711557 usertrap_amd64.go:212] [ 1613(17000): 1613(17000)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:32.459985 711557 usertrap_amd64.go:122] [ 1613(17000): 1613(17000)] Allocate a new trap: 0xc00c6d2120 41 D0706 16:21:32.460109 711557 usertrap_amd64.go:225] [ 1613(17000): 1613(17000)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:32.469341 711557 usertrap_amd64.go:212] [ 1600(15757): 1600(15757)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:32.469486 711557 usertrap_amd64.go:122] [ 1600(15757): 1600(15757)] Allocate a new trap: 0xc16ed8f4d0 44 D0706 16:21:32.469614 711557 usertrap_amd64.go:225] [ 1600(15757): 1600(15757)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:32.477601 711557 usertrap_amd64.go:212] [ 1611(16408): 1611(16408)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:32.477682 711557 usertrap_amd64.go:122] [ 1611(16408): 1611(16408)] Allocate a new trap: 0xc00c6d20f0 43 D0706 16:21:32.477772 711557 usertrap_amd64.go:225] [ 1611(16408): 1611(16408)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:32.479077 711557 usertrap_amd64.go:212] [ 1613(17000): 1613(17000)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:32.479144 711557 usertrap_amd64.go:122] [ 1613(17000): 1613(17000)] Allocate a new trap: 0xc00c6d2120 42 D0706 16:21:32.479215 711557 usertrap_amd64.go:225] [ 1613(17000): 1613(17000)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:32.483759 711557 task_exit.go:204] [ 1611(16408): 1611(16408)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.484047 711557 task_signals.go:204] [ 1611(16408): 1616(16411)] Signal 1611, PID: 1616, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.484182 711557 task_exit.go:204] [ 1611(16408): 1611(16408)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.484322 711557 task_signals.go:204] [ 1611(16408): 1615(16410)] Signal 1611, PID: 1615, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.484403 711557 task_signals.go:204] [ 1611(16408): 1614(16409)] Signal 1611, PID: 1614, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.484476 711557 task_exit.go:204] [ 1611(16408): 1615(16410)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.484655 711557 task_exit.go:204] [ 1611(16408): 1616(16411)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.484858 711557 task_exit.go:204] [ 1611(16408): 1616(16411)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.484931 711557 task_exit.go:204] [ 1611(16408): 1616(16411)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.485114 711557 task_exit.go:204] [ 1611(16408): 1614(16409)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.485562 711557 task_exit.go:204] [ 1611(16408): 1615(16410)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.485641 711557 task_exit.go:204] [ 1611(16408): 1615(16410)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.492775 711557 usertrap_amd64.go:212] [ 1613(17000): 1620(17001)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:32.492843 711557 usertrap_amd64.go:122] [ 1613(17000): 1620(17001)] Allocate a new trap: 0xc00c6d2120 43 D0706 16:21:32.492971 711557 task_exit.go:204] [ 1611(16408): 1614(16409)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.492985 711557 usertrap_amd64.go:225] [ 1613(17000): 1620(17001)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:32.493016 711557 task_exit.go:204] [ 1611(16408): 1614(16409)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.493145 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:32.494430 711557 task_exit.go:204] [ 1611(16408): 1611(16408)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.509840 711557 task_signals.go:470] [ 6: 30] Notified of signal 23 D0706 16:21:32.510061 711557 task_signals.go:220] [ 6: 30] Signal 23: delivering to handler 16:21:32 executing program 1: getresgid(&(0x7f00000003c0), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r1 = getegid() getresgid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) socket$inet6(0xa, 0x4, 0x40) socket$inet_icmp(0x2, 0x2, 0x1) r2 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r3, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/nf_conntrack\x00') r5 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r6 = socket$inet_icmp(0x2, 0x2, 0x1) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='limits\x00') dup3(r6, r7, 0x0) dup3(r6, r6, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={r4, 0x100000001, 0xfff, 0x80000000}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000001c0)=0xc) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r9 = socket$inet_icmp(0x2, 0x2, 0x1) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r9, r10, 0x0) r11 = socket$inet_icmp(0x2, 0x2, 0x1) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='sessionid\x00') dup3(r11, r12, 0x0) fstat(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r13, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r14, 0x0) lchown(&(0x7f0000000300)='./file0\x00', r13, r14) setregid(r1, r0) D0706 16:21:32.532377 711557 usertrap_amd64.go:212] [ 1607(17876): 1621(17881)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:32.532437 711557 usertrap_amd64.go:122] [ 1607(17876): 1621(17881)] Allocate a new trap: 0xc00c6d2030 43 D0706 16:21:32.532528 711557 usertrap_amd64.go:225] [ 1607(17876): 1621(17881)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:32.543853 711557 usertrap_amd64.go:212] [ 1607(17876): 1607(17876)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:32.543908 711557 usertrap_amd64.go:122] [ 1607(17876): 1607(17876)] Allocate a new trap: 0xc00c6d2030 44 D0706 16:21:32.543983 711557 usertrap_amd64.go:225] [ 1607(17876): 1607(17876)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:32.726316 711557 usertrap_amd64.go:212] [ 1613(17000): 1613(17000)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:32.726434 711557 usertrap_amd64.go:122] [ 1613(17000): 1613(17000)] Allocate a new trap: 0xc00c6d2120 44 D0706 16:21:32.726492 711557 usertrap_amd64.go:225] [ 1613(17000): 1613(17000)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:32.922782 711557 usertrap_amd64.go:212] [ 1607(17876): 1607(17876)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:32.922868 711557 usertrap_amd64.go:122] [ 1607(17876): 1607(17876)] Allocate a new trap: 0xc00c6d2030 45 D0706 16:21:32.922939 711557 usertrap_amd64.go:225] [ 1607(17876): 1607(17876)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:32.923286 711557 usertrap_amd64.go:212] [ 1613(17000): 1613(17000)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:32.923387 711557 usertrap_amd64.go:122] [ 1613(17000): 1613(17000)] Allocate a new trap: 0xc00c6d2120 45 D0706 16:21:32.923506 711557 usertrap_amd64.go:225] [ 1613(17000): 1613(17000)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:32.928631 711557 task_exit.go:204] [ 1607(17876): 1607(17876)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.928780 711557 task_signals.go:204] [ 1607(17876): 1610(17877)] Signal 1607, PID: 1610, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.928802 711557 task_signals.go:204] [ 1607(17876): 1622(17882)] Signal 1607, PID: 1622, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.928826 711557 task_signals.go:204] [ 1607(17876): 1619(17880)] Signal 1607, PID: 1619, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.928914 711557 task_signals.go:204] [ 1607(17876): 1612(17878)] Signal 1607, PID: 1612, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.928987 711557 task_exit.go:204] [ 1613(17000): 1613(17000)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.929281 711557 task_signals.go:204] [ 1613(17000): 1623(17002)] Signal 1613, PID: 1623, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.929302 711557 task_signals.go:204] [ 1607(17876): 1618(17879)] Signal 1607, PID: 1618, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.929363 711557 task_signals.go:204] [ 1607(17876): 1621(17881)] Signal 1607, PID: 1621, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.929440 711557 task_exit.go:204] [ 1607(17876): 1610(17877)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.929658 711557 task_signals.go:204] [ 1613(17000): 1620(17001)] Signal 1613, PID: 1620, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.929809 711557 task_signals.go:204] [ 1613(17000): 1624(17003)] Signal 1613, PID: 1624, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.929940 711557 task_signals.go:204] [ 1613(17000): 1625(17004)] Signal 1613, PID: 1625, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:32.930047 711557 task_exit.go:204] [ 1607(17876): 1610(17877)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.930094 711557 task_exit.go:204] [ 1607(17876): 1610(17877)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.930234 711557 task_exit.go:204] [ 1613(17000): 1625(17004)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.930451 711557 task_exit.go:204] [ 1613(17000): 1625(17004)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.930572 711557 task_exit.go:204] [ 1613(17000): 1625(17004)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.930719 711557 task_exit.go:204] [ 1613(17000): 1623(17002)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.930835 711557 task_exit.go:204] [ 1607(17876): 1622(17882)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.931075 711557 task_exit.go:204] [ 1607(17876): 1619(17880)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.931357 711557 task_exit.go:204] [ 1607(17876): 1612(17878)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.931520 711557 task_exit.go:204] [ 1607(17876): 1618(17879)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.931641 711557 task_exit.go:204] [ 1607(17876): 1621(17881)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.931705 711557 task_exit.go:204] [ 1613(17000): 1620(17001)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.931837 711557 task_exit.go:204] [ 1613(17000): 1624(17003)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:32.932346 711557 task_exit.go:204] [ 1613(17000): 1623(17002)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.932412 711557 task_exit.go:204] [ 1613(17000): 1623(17002)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.933249 711557 task_exit.go:204] [ 1613(17000): 1624(17003)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.933303 711557 task_exit.go:204] [ 1613(17000): 1624(17003)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.933664 711557 task_exit.go:204] [ 1607(17876): 1622(17882)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.933754 711557 task_exit.go:204] [ 1607(17876): 1622(17882)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.933933 711557 task_exit.go:204] [ 1607(17876): 1619(17880)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.934017 711557 task_exit.go:204] [ 1607(17876): 1619(17880)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.934107 711557 task_exit.go:204] [ 1613(17000): 1613(17000)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.934277 711557 task_exit.go:204] [ 1607(17876): 1618(17879)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.934342 711557 task_exit.go:204] [ 1607(17876): 1618(17879)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.934536 711557 task_exit.go:204] [ 1607(17876): 1612(17878)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.934611 711557 task_exit.go:204] [ 1607(17876): 1612(17878)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.935103 711557 task_exit.go:204] [ 1607(17876): 1607(17876)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.945610 711557 task_exit.go:204] [ 1613(17000): 1620(17001)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.945714 711557 task_exit.go:204] [ 1613(17000): 1620(17001)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.945799 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:32.946380 711557 task_exit.go:204] [ 1607(17876): 1621(17881)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:32.946518 711557 task_exit.go:204] [ 1607(17876): 1621(17881)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.946608 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:32.946788 711557 task_exit.go:204] [ 1613(17000): 1613(17000)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:32.947509 711557 task_exit.go:204] [ 1607(17876): 1607(17876)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:32 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:32 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x1b, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) fcntl$setpipe(r1, 0x407, 0x102000000000000) D0706 16:21:33.014255 711557 usertrap_amd64.go:212] [ 1626(16412): 1626(16412)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:33.014365 711557 usertrap_amd64.go:122] [ 1626(16412): 1626(16412)] Allocate a new trap: 0xc0004755f0 40 D0706 16:21:33.017159 711557 usertrap_amd64.go:225] [ 1626(16412): 1626(16412)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:33.020061 711557 usertrap_amd64.go:212] [ 1626(16412): 1626(16412)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:33.020190 711557 usertrap_amd64.go:122] [ 1626(16412): 1626(16412)] Allocate a new trap: 0xc0004755f0 41 D0706 16:21:33.020295 711557 usertrap_amd64.go:225] [ 1626(16412): 1626(16412)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:33.041222 711557 usertrap_amd64.go:212] [ 1626(16412): 1626(16412)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:33.041354 711557 usertrap_amd64.go:122] [ 1626(16412): 1626(16412)] Allocate a new trap: 0xc0004755f0 42 D0706 16:21:33.041440 711557 usertrap_amd64.go:225] [ 1626(16412): 1626(16412)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:33.042208 711557 usertrap_amd64.go:212] [ 1627(17883): 1627(17883)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:33.042317 711557 usertrap_amd64.go:122] [ 1627(17883): 1627(17883)] Allocate a new trap: 0xc2f1c5e450 40 D0706 16:21:33.043158 711557 usertrap_amd64.go:225] [ 1627(17883): 1627(17883)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:33.051022 711557 usertrap_amd64.go:212] [ 1627(17883): 1627(17883)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:33.051149 711557 usertrap_amd64.go:122] [ 1627(17883): 1627(17883)] Allocate a new trap: 0xc2f1c5e450 41 D0706 16:21:33.051309 711557 usertrap_amd64.go:225] [ 1627(17883): 1627(17883)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:33.051871 711557 usertrap_amd64.go:212] [ 1626(16412): 1629(16413)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:33.051929 711557 usertrap_amd64.go:122] [ 1626(16412): 1629(16413)] Allocate a new trap: 0xc0004755f0 43 D0706 16:21:33.051987 711557 usertrap_amd64.go:225] [ 1626(16412): 1629(16413)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:33.065584 711557 usertrap_amd64.go:212] [ 1628(17005): 1628(17005)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:33.065703 711557 usertrap_amd64.go:122] [ 1628(17005): 1628(17005)] Allocate a new trap: 0xc00c6d21b0 40 D0706 16:21:33.066680 711557 usertrap_amd64.go:225] [ 1628(17005): 1628(17005)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:33.070778 711557 usertrap_amd64.go:212] [ 1628(17005): 1628(17005)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:33.070987 711557 usertrap_amd64.go:122] [ 1628(17005): 1628(17005)] Allocate a new trap: 0xc00c6d21b0 41 D0706 16:21:33.071102 711557 usertrap_amd64.go:225] [ 1628(17005): 1628(17005)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:33.072154 711557 usertrap_amd64.go:212] [ 1626(16412): 1626(16412)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:33.072215 711557 usertrap_amd64.go:122] [ 1626(16412): 1626(16412)] Allocate a new trap: 0xc0004755f0 44 D0706 16:21:33.072296 711557 usertrap_amd64.go:225] [ 1626(16412): 1626(16412)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:33.073984 711557 usertrap_amd64.go:212] [ 1627(17883): 1627(17883)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:33.074074 711557 usertrap_amd64.go:122] [ 1627(17883): 1627(17883)] Allocate a new trap: 0xc2f1c5e450 42 D0706 16:21:33.074154 711557 usertrap_amd64.go:225] [ 1627(17883): 1627(17883)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:33.076561 711557 task_exit.go:204] [ 1626(16412): 1626(16412)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.076766 711557 task_signals.go:204] [ 1626(16412): 1629(16413)] Signal 1626, PID: 1629, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.076840 711557 task_exit.go:204] [ 1626(16412): 1626(16412)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.077224 711557 task_exit.go:204] [ 1626(16412): 1629(16413)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.084011 711557 usertrap_amd64.go:212] [ 1627(17883): 1630(17884)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:33.084083 711557 usertrap_amd64.go:122] [ 1627(17883): 1630(17884)] Allocate a new trap: 0xc2f1c5e450 43 D0706 16:21:33.084162 711557 usertrap_amd64.go:225] [ 1627(17883): 1630(17884)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:33.088855 711557 task_exit.go:204] [ 1626(16412): 1629(16413)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.088932 711557 task_exit.go:204] [ 1626(16412): 1629(16413)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.089394 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:33.089769 711557 task_exit.go:204] [ 1626(16412): 1626(16412)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:33 executing program 1: getresgid(&(0x7f00000003c0), &(0x7f0000000480), &(0x7f00000004c0)) (async) getresgid(&(0x7f00000003c0), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getegid() (async) r1 = getegid() getresgid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) socket$inet6(0xa, 0x4, 0x40) socket$inet_icmp(0x2, 0x2, 0x1) r2 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r3, 0x0) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r3, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/nf_conntrack\x00') r5 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r6 = socket$inet_icmp(0x2, 0x2, 0x1) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='limits\x00') dup3(r6, r7, 0x0) (async) dup3(r6, r7, 0x0) dup3(r6, r6, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={r4, 0x100000001, 0xfff, 0x80000000}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000001c0)=0xc) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) (async) r9 = socket$inet_icmp(0x2, 0x2, 0x1) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r9, r10, 0x0) r11 = socket$inet_icmp(0x2, 0x2, 0x1) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='sessionid\x00') dup3(r11, r12, 0x0) (async) dup3(r11, r12, 0x0) fstat(r5, &(0x7f0000000340)) (async) fstat(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r13, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r14, 0x0) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r14, 0x0) lchown(&(0x7f0000000300)='./file0\x00', r13, r14) (async) lchown(&(0x7f0000000300)='./file0\x00', r13, r14) setregid(r1, r0) D0706 16:21:33.093245 711557 usertrap_amd64.go:212] [ 1627(17883): 1627(17883)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:33.093315 711557 usertrap_amd64.go:122] [ 1627(17883): 1627(17883)] Allocate a new trap: 0xc2f1c5e450 44 D0706 16:21:33.093390 711557 usertrap_amd64.go:225] [ 1627(17883): 1627(17883)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:33.096839 711557 task_exit.go:204] [ 1627(17883): 1627(17883)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.097183 711557 task_exit.go:204] [ 1627(17883): 1627(17883)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.097385 711557 task_signals.go:204] [ 1627(17883): 1630(17884)] Signal 1627, PID: 1630, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.097486 711557 task_exit.go:204] [ 1627(17883): 1630(17884)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.099719 711557 usertrap_amd64.go:212] [ 1628(17005): 1628(17005)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:33.099787 711557 usertrap_amd64.go:122] [ 1628(17005): 1628(17005)] Allocate a new trap: 0xc00c6d21b0 42 D0706 16:21:33.099905 711557 usertrap_amd64.go:225] [ 1628(17005): 1628(17005)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:33.108499 711557 task_exit.go:204] [ 1627(17883): 1630(17884)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.108586 711557 task_exit.go:204] [ 1627(17883): 1630(17884)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.108681 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:33.110014 711557 task_exit.go:204] [ 1627(17883): 1627(17883)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.110254 711557 usertrap_amd64.go:212] [ 1628(17005): 1631(17006)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:33.110338 711557 usertrap_amd64.go:122] [ 1628(17005): 1631(17006)] Allocate a new trap: 0xc00c6d21b0 43 D0706 16:21:33.110413 711557 usertrap_amd64.go:225] [ 1628(17005): 1631(17006)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:33.120435 711557 usertrap_amd64.go:212] [ 1628(17005): 1628(17005)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:33.120549 711557 usertrap_amd64.go:122] [ 1628(17005): 1628(17005)] Allocate a new trap: 0xc00c6d21b0 44 D0706 16:21:33.120643 711557 usertrap_amd64.go:225] [ 1628(17005): 1628(17005)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:33.127785 711557 task_exit.go:204] [ 1628(17005): 1628(17005)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.127950 711557 task_signals.go:204] [ 1628(17005): 1631(17006)] Signal 1628, PID: 1631, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.128034 711557 task_exit.go:204] [ 1628(17005): 1628(17005)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.128183 711557 task_exit.go:204] [ 1628(17005): 1631(17006)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.133073 711557 usertrap_amd64.go:212] [ 1632(16414): 1632(16414)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:33.133167 711557 usertrap_amd64.go:122] [ 1632(16414): 1632(16414)] Allocate a new trap: 0xc017060180 40 D0706 16:21:33.134009 711557 usertrap_amd64.go:225] [ 1632(16414): 1632(16414)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:33.136675 711557 task_exit.go:204] [ 1628(17005): 1631(17006)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.136754 711557 task_exit.go:204] [ 1628(17005): 1631(17006)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.137222 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:33.137574 711557 task_exit.go:204] [ 1628(17005): 1628(17005)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.150090 711557 usertrap_amd64.go:212] [ 1632(16414): 1632(16414)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:33.150187 711557 usertrap_amd64.go:122] [ 1632(16414): 1632(16414)] Allocate a new trap: 0xc017060180 41 D0706 16:21:33.150259 711557 usertrap_amd64.go:225] [ 1632(16414): 1632(16414)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:33.166732 711557 usertrap_amd64.go:212] [ 1632(16414): 1632(16414)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:33.166986 711557 usertrap_amd64.go:122] [ 1632(16414): 1632(16414)] Allocate a new trap: 0xc017060180 42 D0706 16:21:33.167186 711557 usertrap_amd64.go:225] [ 1632(16414): 1632(16414)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:33.178071 711557 usertrap_amd64.go:212] [ 1632(16414): 1633(16415)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:33.178157 711557 usertrap_amd64.go:122] [ 1632(16414): 1633(16415)] Allocate a new trap: 0xc017060180 43 D0706 16:21:33.178238 711557 usertrap_amd64.go:225] [ 1632(16414): 1633(16415)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:33.202557 711557 usertrap_amd64.go:212] [ 1600(15757): 1600(15757)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:33.202631 711557 usertrap_amd64.go:122] [ 1600(15757): 1600(15757)] Allocate a new trap: 0xc16ed8f4d0 45 D0706 16:21:33.202711 711557 usertrap_amd64.go:225] [ 1600(15757): 1600(15757)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:33.206181 711557 task_exit.go:204] [ 1600(15757): 1600(15757)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.206453 711557 task_exit.go:204] [ 1600(15757): 1600(15757)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.206615 711557 task_signals.go:204] [ 1600(15757): 1608(15758)] Signal 1600, PID: 1608, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.206778 711557 task_exit.go:204] [ 1600(15757): 1608(15758)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.207019 711557 task_signals.go:204] [ 1600(15757): 1617(15759)] Signal 1600, PID: 1617, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.207156 711557 task_exit.go:204] [ 1600(15757): 1608(15758)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.207247 711557 task_exit.go:204] [ 1600(15757): 1608(15758)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.207668 711557 task_exit.go:204] [ 1600(15757): 1617(15759)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.213881 711557 usertrap_amd64.go:212] [ 1632(16414): 1632(16414)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:33.214055 711557 usertrap_amd64.go:122] [ 1632(16414): 1632(16414)] Allocate a new trap: 0xc017060180 44 D0706 16:21:33.214238 711557 usertrap_amd64.go:225] [ 1632(16414): 1632(16414)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:33.216376 711557 task_exit.go:204] [ 1600(15757): 1617(15759)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.216435 711557 task_exit.go:204] [ 1600(15757): 1617(15759)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.216568 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:33.216930 711557 task_exit.go:204] [ 1600(15757): 1600(15757)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.218009 711557 task_exit.go:204] [ 1632(16414): 1632(16414)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.218266 711557 task_signals.go:204] [ 1632(16414): 1634(16416)] Signal 1632, PID: 1634, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.218323 711557 task_exit.go:204] [ 1632(16414): 1632(16414)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.218438 711557 task_exit.go:204] [ 1632(16414): 1634(16416)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.218651 711557 task_signals.go:204] [ 1632(16414): 1633(16415)] Signal 1632, PID: 1633, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.218731 711557 task_exit.go:204] [ 1632(16414): 1634(16416)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.218817 711557 task_exit.go:204] [ 1632(16414): 1634(16416)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.218950 711557 task_exit.go:204] [ 1632(16414): 1633(16415)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:21:33 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:33 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x1b, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) (async, rerun: 64) fcntl$setpipe(r1, 0x407, 0x102000000000000) (rerun: 64) 16:21:33 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:33.233376 711557 task_exit.go:204] [ 1632(16414): 1633(16415)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.233508 711557 task_exit.go:204] [ 1632(16414): 1633(16415)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.233614 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 16:21:33 executing program 1: getresgid(&(0x7f00000003c0), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r1 = getegid() getresgid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) (async) getresgid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) socket$inet6(0xa, 0x4, 0x40) socket$inet_icmp(0x2, 0x2, 0x1) r2 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r3, 0x0) (async) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r3, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/nf_conntrack\x00') openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (async) r5 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) (async) r6 = socket$inet_icmp(0x2, 0x2, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='limits\x00') (async) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='limits\x00') dup3(r6, r7, 0x0) dup3(r6, r6, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={r4, 0x100000001, 0xfff, 0x80000000}) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={r4, 0x100000001, 0xfff, 0x80000000}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000001c0)=0xc) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r9 = socket$inet_icmp(0x2, 0x2, 0x1) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r9, r10, 0x0) (async) dup3(r9, r10, 0x0) r11 = socket$inet_icmp(0x2, 0x2, 0x1) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='sessionid\x00') dup3(r11, r12, 0x0) (async) dup3(r11, r12, 0x0) fstat(r5, &(0x7f0000000340)) (async) fstat(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r13, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r14, 0x0) lchown(&(0x7f0000000300)='./file0\x00', r13, r14) setregid(r1, r0) (async) setregid(r1, r0) D0706 16:21:33.234696 711557 task_exit.go:204] [ 1632(16414): 1632(16414)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.262884 711557 usertrap_amd64.go:212] [ 1637(15760): 1637(15760)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:33.262996 711557 usertrap_amd64.go:122] [ 1637(15760): 1637(15760)] Allocate a new trap: 0xc008918c90 40 D0706 16:21:33.263826 711557 usertrap_amd64.go:225] [ 1637(15760): 1637(15760)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:33.264319 711557 usertrap_amd64.go:212] [ 1635(17007): 1635(17007)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:33.264382 711557 usertrap_amd64.go:212] [ 1636(17885): 1636(17885)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:33.264458 711557 usertrap_amd64.go:122] [ 1635(17007): 1635(17007)] Allocate a new trap: 0xc00c211350 40 D0706 16:21:33.264456 711557 usertrap_amd64.go:122] [ 1636(17885): 1636(17885)] Allocate a new trap: 0xc0085106f0 40 D0706 16:21:33.265419 711557 usertrap_amd64.go:225] [ 1635(17007): 1635(17007)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:33.265620 711557 usertrap_amd64.go:225] [ 1636(17885): 1636(17885)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:33.268692 711557 usertrap_amd64.go:212] [ 1637(15760): 1637(15760)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:33.268771 711557 usertrap_amd64.go:122] [ 1637(15760): 1637(15760)] Allocate a new trap: 0xc008918c90 41 D0706 16:21:33.268848 711557 usertrap_amd64.go:225] [ 1637(15760): 1637(15760)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:33.270640 711557 usertrap_amd64.go:212] [ 1635(17007): 1635(17007)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:33.270814 711557 usertrap_amd64.go:122] [ 1635(17007): 1635(17007)] Allocate a new trap: 0xc00c211350 41 D0706 16:21:33.271157 711557 usertrap_amd64.go:225] [ 1635(17007): 1635(17007)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:33.274187 711557 usertrap_amd64.go:212] [ 1636(17885): 1636(17885)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:33.274323 711557 usertrap_amd64.go:122] [ 1636(17885): 1636(17885)] Allocate a new trap: 0xc0085106f0 41 D0706 16:21:33.274426 711557 usertrap_amd64.go:225] [ 1636(17885): 1636(17885)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:33.276648 711557 usertrap_amd64.go:212] [ 1638(16417): 1638(16417)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:33.276764 711557 usertrap_amd64.go:122] [ 1638(16417): 1638(16417)] Allocate a new trap: 0xc00c6d22a0 40 D0706 16:21:33.289147 711557 usertrap_amd64.go:225] [ 1638(16417): 1638(16417)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:33.289578 711557 usertrap_amd64.go:212] [ 1637(15760): 1637(15760)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:33.289636 711557 usertrap_amd64.go:122] [ 1637(15760): 1637(15760)] Allocate a new trap: 0xc008918c90 42 D0706 16:21:33.289726 711557 usertrap_amd64.go:225] [ 1637(15760): 1637(15760)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:33.290267 711557 usertrap_amd64.go:212] [ 1636(17885): 1636(17885)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:33.290356 711557 usertrap_amd64.go:122] [ 1636(17885): 1636(17885)] Allocate a new trap: 0xc0085106f0 42 D0706 16:21:33.290425 711557 usertrap_amd64.go:225] [ 1636(17885): 1636(17885)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:33.292447 711557 usertrap_amd64.go:212] [ 1638(16417): 1638(16417)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:33.292646 711557 usertrap_amd64.go:122] [ 1638(16417): 1638(16417)] Allocate a new trap: 0xc00c6d22a0 41 D0706 16:21:33.292706 711557 usertrap_amd64.go:225] [ 1638(16417): 1638(16417)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:33.293346 711557 usertrap_amd64.go:212] [ 1635(17007): 1635(17007)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:33.293403 711557 usertrap_amd64.go:122] [ 1635(17007): 1635(17007)] Allocate a new trap: 0xc00c211350 42 D0706 16:21:33.293486 711557 usertrap_amd64.go:225] [ 1635(17007): 1635(17007)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:33.299826 711557 usertrap_amd64.go:212] [ 1636(17885): 1640(17886)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:33.299884 711557 usertrap_amd64.go:122] [ 1636(17885): 1640(17886)] Allocate a new trap: 0xc0085106f0 43 D0706 16:21:33.299949 711557 usertrap_amd64.go:225] [ 1636(17885): 1640(17886)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:33.301656 711557 usertrap_amd64.go:212] [ 1637(15760): 1639(15761)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:33.301746 711557 usertrap_amd64.go:122] [ 1637(15760): 1639(15761)] Allocate a new trap: 0xc008918c90 43 D0706 16:21:33.301836 711557 usertrap_amd64.go:225] [ 1637(15760): 1639(15761)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:33.309703 711557 usertrap_amd64.go:212] [ 1636(17885): 1636(17885)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:33.309763 711557 usertrap_amd64.go:122] [ 1636(17885): 1636(17885)] Allocate a new trap: 0xc0085106f0 44 D0706 16:21:33.309827 711557 usertrap_amd64.go:225] [ 1636(17885): 1636(17885)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:33.309986 711557 usertrap_amd64.go:212] [ 1635(17007): 1641(17008)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:33.310075 711557 usertrap_amd64.go:122] [ 1635(17007): 1641(17008)] Allocate a new trap: 0xc00c211350 43 D0706 16:21:33.310239 711557 usertrap_amd64.go:225] [ 1635(17007): 1641(17008)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:33.313275 711557 usertrap_amd64.go:212] [ 1638(16417): 1638(16417)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:33.313328 711557 usertrap_amd64.go:122] [ 1638(16417): 1638(16417)] Allocate a new trap: 0xc00c6d22a0 42 D0706 16:21:33.313412 711557 usertrap_amd64.go:225] [ 1638(16417): 1638(16417)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:33.313614 711557 usertrap_amd64.go:212] [ 1636(17885): 1636(17885)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:33.313673 711557 usertrap_amd64.go:122] [ 1636(17885): 1636(17885)] Allocate a new trap: 0xc0085106f0 45 D0706 16:21:33.313742 711557 usertrap_amd64.go:225] [ 1636(17885): 1636(17885)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:33.323111 711557 usertrap_amd64.go:212] [ 1635(17007): 1635(17007)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:33.323191 711557 usertrap_amd64.go:122] [ 1635(17007): 1635(17007)] Allocate a new trap: 0xc00c211350 44 D0706 16:21:33.323257 711557 usertrap_amd64.go:225] [ 1635(17007): 1635(17007)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:33.323326 711557 usertrap_amd64.go:212] [ 1638(16417): 1643(16418)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:33.323394 711557 usertrap_amd64.go:122] [ 1638(16417): 1643(16418)] Allocate a new trap: 0xc00c6d22a0 43 D0706 16:21:33.323483 711557 usertrap_amd64.go:225] [ 1638(16417): 1643(16418)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:33.324579 711557 task_exit.go:204] [ 1636(17885): 1636(17885)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.324753 711557 task_signals.go:204] [ 1636(17885): 1640(17886)] Signal 1636, PID: 1640, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.324789 711557 task_signals.go:204] [ 1636(17885): 1642(17887)] Signal 1636, PID: 1642, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.324866 711557 task_exit.go:204] [ 1636(17885): 1640(17886)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.325038 711557 task_exit.go:204] [ 1636(17885): 1642(17887)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.325122 711557 task_exit.go:204] [ 1636(17885): 1636(17885)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.325399 711557 task_exit.go:204] [ 1636(17885): 1640(17886)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.325516 711557 task_exit.go:204] [ 1636(17885): 1640(17886)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.327652 711557 task_exit.go:204] [ 1635(17007): 1635(17007)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.327875 711557 task_signals.go:204] [ 1635(17007): 1641(17008)] Signal 1635, PID: 1641, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.327933 711557 task_exit.go:204] [ 1635(17007): 1635(17007)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.328104 711557 task_exit.go:204] [ 1635(17007): 1641(17008)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.333616 711557 task_exit.go:204] [ 1636(17885): 1642(17887)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.333689 711557 task_exit.go:204] [ 1636(17885): 1642(17887)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.333764 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:33.334119 711557 task_exit.go:204] [ 1636(17885): 1636(17885)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:33 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x1b, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (async, rerun: 64) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') (rerun: 64) dup3(r1, r2, 0x0) fcntl$setpipe(r1, 0x407, 0x102000000000000) D0706 16:21:33.339757 711557 task_exit.go:204] [ 1635(17007): 1641(17008)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.339855 711557 task_exit.go:204] [ 1635(17007): 1641(17008)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.340002 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:33.340171 711557 task_exit.go:204] [ 1635(17007): 1635(17007)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:33 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:33.343878 711557 usertrap_amd64.go:212] [ 1638(16417): 1638(16417)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:33.343948 711557 usertrap_amd64.go:122] [ 1638(16417): 1638(16417)] Allocate a new trap: 0xc00c6d22a0 44 D0706 16:21:33.344011 711557 usertrap_amd64.go:225] [ 1638(16417): 1638(16417)] Apply the binary patch addr 55bc30e840aa trap addr 62dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:33.345362 711557 usertrap_amd64.go:212] [ 1638(16417): 1638(16417)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:33.345445 711557 usertrap_amd64.go:122] [ 1638(16417): 1638(16417)] Allocate a new trap: 0xc00c6d22a0 45 D0706 16:21:33.345522 711557 usertrap_amd64.go:225] [ 1638(16417): 1638(16417)] Apply the binary patch addr 55bc30e11124 trap addr 62e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 46 6 0]) D0706 16:21:33.350141 711557 task_exit.go:204] [ 1638(16417): 1638(16417)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.350374 711557 task_signals.go:204] [ 1638(16417): 1643(16418)] Signal 1638, PID: 1643, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.350414 711557 task_signals.go:204] [ 1638(16417): 1644(16419)] Signal 1638, PID: 1644, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.350460 711557 task_exit.go:204] [ 1638(16417): 1643(16418)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.350567 711557 task_exit.go:204] [ 1638(16417): 1638(16417)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.350697 711557 task_exit.go:204] [ 1638(16417): 1643(16418)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.350748 711557 task_exit.go:204] [ 1638(16417): 1643(16418)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.350818 711557 task_exit.go:204] [ 1638(16417): 1644(16419)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.358320 711557 task_exit.go:204] [ 1638(16417): 1644(16419)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.358421 711557 task_exit.go:204] [ 1638(16417): 1644(16419)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.358581 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:33.359182 711557 task_exit.go:204] [ 1638(16417): 1638(16417)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:33 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x1, 0x1}, 0x46}}, 0x18) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0xf33c, 0x66, 0xffffffffffffffff, 0x3, 0x24, 0x5, 0x3, 0x7, 0x4, 0x7, 0x6, 0x81, 0x2, 0x2}, 0x10, [0x0, 0x0]}) r2 = dup(0xffffffffffffffff) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x37e) ppoll(&(0x7f0000000140)=[{r2, 0xc}, {0xffffffffffffffff, 0x404}, {r3, 0x4005}, {r1, 0x20}], 0x4, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0xa47]}, 0x8) clock_getres(0x2, &(0x7f0000000200)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/power_supply', 0x1, 0x8899b847d18801e3) write$P9_RSTAT(r4, &(0x7f0000000280)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0xfff, 0x200, {0x4, 0x4, 0x8}, 0xa5040000, 0x0, 0x5, 0x1ff, 0xa, '/dev/full\x00', 0x7, '+})#+\xdc$', 0xa, '/dev/full\x00', 0xa, '/dev/full\x00'}}, 0x5f) r5 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x694000, 0x48) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000340)=0x5, 0x4) dup(r1) fremovexattr(r3, &(0x7f0000000380)=@random={'btrfs.', '+})#+\xdc$'}) close(0xffffffffffffffff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r6 = timerfd_create(0x3, 0x80000) sync_file_range(r6, 0x1, 0x6, 0x0) mkdirat(r4, &(0x7f00000003c0)='./file0\x00', 0x5) r7 = mq_open(&(0x7f0000000400)='+})#+\xdc$', 0x800, 0x81, &(0x7f0000000440)={0x7, 0x0, 0x20}) ppoll(&(0x7f0000000480)=[{r0, 0x42d8}, {r2, 0x2200}, {r4, 0x1089}, {r7, 0xa004}, {r0, 0x221}], 0x5, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500)={[0xfffffffffffffff7]}, 0x8) mount$9p_rdma(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x80c020, &(0x7f0000000600)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0xffffffff}}, {@timeout={'timeout', 0x3d, 0x40}}, {@rq={'rq', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0x6}}, {@common=@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}], [{@euid_eq={'euid', 0x3d, 0xee01}}]}}) r8 = accept4$inet6(r2, 0x0, &(0x7f0000000700), 0x80000) dup2(r8, r2) timer_create(0x5, &(0x7f0000000740)={0x0, 0x15, 0x2}, &(0x7f0000000780)) openat$cgroup_ro(r5, &(0x7f00000007c0)='memory.events\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f0000000800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mq_open(&(0x7f0000000a40)='\x00', 0x40, 0x45, &(0x7f0000000a80)={0x9d6, 0x0, 0x1, 0xbbd}) openat$incfs(0xffffffffffffffff, &(0x7f0000000ac0)='.pending_reads\x00', 0x40000, 0x80) D0706 16:21:33.370148 711557 usertrap_amd64.go:212] [ 1637(15760): 1637(15760)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:33.370233 711557 usertrap_amd64.go:122] [ 1637(15760): 1637(15760)] Allocate a new trap: 0xc008918c90 44 D0706 16:21:33.370366 711557 usertrap_amd64.go:225] [ 1637(15760): 1637(15760)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:33.370542 711557 usertrap_amd64.go:212] [ 1645(17888): 1645(17888)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:33.370712 711557 usertrap_amd64.go:122] [ 1645(17888): 1645(17888)] Allocate a new trap: 0xc0038edbf0 40 D0706 16:21:33.371688 711557 usertrap_amd64.go:225] [ 1645(17888): 1645(17888)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:33.374805 711557 usertrap_amd64.go:212] [ 1645(17888): 1645(17888)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:33.374888 711557 usertrap_amd64.go:122] [ 1645(17888): 1645(17888)] Allocate a new trap: 0xc0038edbf0 41 D0706 16:21:33.374825 711557 usertrap_amd64.go:212] [ 1646(17009): 1646(17009)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:33.374982 711557 usertrap_amd64.go:225] [ 1645(17888): 1645(17888)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:33.375021 711557 usertrap_amd64.go:122] [ 1646(17009): 1646(17009)] Allocate a new trap: 0xc1e5771a10 40 D0706 16:21:33.375748 711557 usertrap_amd64.go:225] [ 1646(17009): 1646(17009)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:33.378490 711557 usertrap_amd64.go:212] [ 1646(17009): 1646(17009)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:33.378581 711557 usertrap_amd64.go:122] [ 1646(17009): 1646(17009)] Allocate a new trap: 0xc1e5771a10 41 D0706 16:21:33.378687 711557 usertrap_amd64.go:225] [ 1646(17009): 1646(17009)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:33.384981 711557 usertrap_amd64.go:212] [ 1648(16420): 1648(16420)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:33.385091 711557 usertrap_amd64.go:122] [ 1648(16420): 1648(16420)] Allocate a new trap: 0xc008918cc0 40 D0706 16:21:33.385803 711557 usertrap_amd64.go:225] [ 1648(16420): 1648(16420)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:33.398566 711557 usertrap_amd64.go:212] [ 1645(17888): 1645(17888)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:33.398634 711557 usertrap_amd64.go:122] [ 1645(17888): 1645(17888)] Allocate a new trap: 0xc0038edbf0 42 D0706 16:21:33.398742 711557 usertrap_amd64.go:225] [ 1645(17888): 1645(17888)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:33.398873 711557 usertrap_amd64.go:212] [ 1648(16420): 1648(16420)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:33.398955 711557 usertrap_amd64.go:122] [ 1648(16420): 1648(16420)] Allocate a new trap: 0xc008918cc0 41 D0706 16:21:33.399022 711557 usertrap_amd64.go:225] [ 1648(16420): 1648(16420)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:33.406493 711557 usertrap_amd64.go:212] [ 1645(17888): 1650(17890)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:33.406631 711557 usertrap_amd64.go:122] [ 1645(17888): 1650(17890)] Allocate a new trap: 0xc0038edbf0 43 D0706 16:21:33.406767 711557 usertrap_amd64.go:225] [ 1645(17888): 1650(17890)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:33.410443 711557 usertrap_amd64.go:212] [ 1646(17009): 1646(17009)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:33.410538 711557 usertrap_amd64.go:122] [ 1646(17009): 1646(17009)] Allocate a new trap: 0xc1e5771a10 42 D0706 16:21:33.410697 711557 usertrap_amd64.go:225] [ 1646(17009): 1646(17009)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:33.418483 711557 usertrap_amd64.go:212] [ 1646(17009): 1651(17010)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:33.418543 711557 usertrap_amd64.go:122] [ 1646(17009): 1651(17010)] Allocate a new trap: 0xc1e5771a10 43 D0706 16:21:33.418623 711557 usertrap_amd64.go:225] [ 1646(17009): 1651(17010)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:33.425297 711557 usertrap_amd64.go:212] [ 1648(16420): 1648(16420)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:33.425355 711557 usertrap_amd64.go:122] [ 1648(16420): 1648(16420)] Allocate a new trap: 0xc008918cc0 42 D0706 16:21:33.425451 711557 usertrap_amd64.go:225] [ 1648(16420): 1648(16420)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:33.428103 711557 usertrap_amd64.go:212] [ 1646(17009): 1646(17009)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:33.428239 711557 usertrap_amd64.go:122] [ 1646(17009): 1646(17009)] Allocate a new trap: 0xc1e5771a10 44 D0706 16:21:33.428309 711557 usertrap_amd64.go:225] [ 1646(17009): 1646(17009)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:33.436227 711557 task_exit.go:204] [ 1646(17009): 1646(17009)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.436385 711557 task_exit.go:204] [ 1646(17009): 1646(17009)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.436508 711557 task_signals.go:204] [ 1646(17009): 1651(17010)] Signal 1646, PID: 1651, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.436605 711557 task_exit.go:204] [ 1646(17009): 1651(17010)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.437707 711557 usertrap_amd64.go:212] [ 1645(17888): 1645(17888)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:33.437793 711557 usertrap_amd64.go:122] [ 1645(17888): 1645(17888)] Allocate a new trap: 0xc0038edbf0 44 D0706 16:21:33.437883 711557 usertrap_amd64.go:225] [ 1645(17888): 1645(17888)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:33.443931 711557 task_exit.go:204] [ 1645(17888): 1645(17888)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.444127 711557 task_exit.go:204] [ 1645(17888): 1645(17888)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.444229 711557 task_signals.go:204] [ 1645(17888): 1649(17889)] Signal 1645, PID: 1649, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.444316 711557 task_signals.go:204] [ 1645(17888): 1650(17890)] Signal 1645, PID: 1650, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.444422 711557 task_exit.go:204] [ 1646(17009): 1651(17010)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.444495 711557 task_exit.go:204] [ 1646(17009): 1651(17010)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.444640 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:33.444740 711557 task_exit.go:204] [ 1645(17888): 1649(17889)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.444877 711557 task_exit.go:204] [ 1645(17888): 1649(17889)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.444920 711557 task_exit.go:204] [ 1645(17888): 1649(17889)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.445060 711557 task_exit.go:204] [ 1645(17888): 1650(17890)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.445693 711557 task_exit.go:204] [ 1646(17009): 1646(17009)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:33 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:33.454098 711557 usertrap_amd64.go:212] [ 1648(16420): 1648(16420)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:33.454221 711557 usertrap_amd64.go:122] [ 1648(16420): 1648(16420)] Allocate a new trap: 0xc008918cc0 43 D0706 16:21:33.454315 711557 usertrap_amd64.go:225] [ 1648(16420): 1648(16420)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:33.458681 711557 task_exit.go:204] [ 1645(17888): 1650(17890)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.458820 711557 task_exit.go:204] [ 1645(17888): 1650(17890)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.458936 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:33.460001 711557 task_exit.go:204] [ 1648(16420): 1648(16420)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.460168 711557 task_exit.go:204] [ 1645(17888): 1645(17888)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.460577 711557 task_signals.go:204] [ 1648(16420): 1652(16421)] Signal 1648, PID: 1652, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.460909 711557 task_exit.go:204] [ 1648(16420): 1652(16421)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.461168 711557 task_exit.go:204] [ 1648(16420): 1648(16420)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.470421 711557 task_exit.go:204] [ 1648(16420): 1652(16421)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.470497 711557 task_exit.go:204] [ 1648(16420): 1652(16421)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.470617 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:33.471255 711557 task_exit.go:204] [ 1648(16420): 1648(16420)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.479058 711557 usertrap_amd64.go:212] [ 1653(17011): 1653(17011)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:33.479141 711557 usertrap_amd64.go:122] [ 1653(17011): 1653(17011)] Allocate a new trap: 0xc00c211380 40 D0706 16:21:33.479944 711557 usertrap_amd64.go:225] [ 1653(17011): 1653(17011)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:33.482532 711557 usertrap_amd64.go:212] [ 1653(17011): 1653(17011)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:33.482596 711557 usertrap_amd64.go:122] [ 1653(17011): 1653(17011)] Allocate a new trap: 0xc00c211380 41 D0706 16:21:33.482733 711557 usertrap_amd64.go:225] [ 1653(17011): 1653(17011)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:33.501094 711557 usertrap_amd64.go:212] [ 1653(17011): 1653(17011)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:33.501153 711557 usertrap_amd64.go:122] [ 1653(17011): 1653(17011)] Allocate a new trap: 0xc00c211380 42 D0706 16:21:33.501202 711557 usertrap_amd64.go:225] [ 1653(17011): 1653(17011)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:33.509373 711557 usertrap_amd64.go:212] [ 1653(17011): 1654(17012)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:33.509460 711557 usertrap_amd64.go:122] [ 1653(17011): 1654(17012)] Allocate a new trap: 0xc00c211380 43 D0706 16:21:33.509520 711557 usertrap_amd64.go:225] [ 1653(17011): 1654(17012)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:33.515436 711557 usertrap_amd64.go:212] [ 1653(17011): 1653(17011)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:33.515571 711557 usertrap_amd64.go:122] [ 1653(17011): 1653(17011)] Allocate a new trap: 0xc00c211380 44 D0706 16:21:33.515655 711557 usertrap_amd64.go:225] [ 1653(17011): 1653(17011)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:33.518155 711557 task_exit.go:204] [ 1653(17011): 1653(17011)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.518388 711557 task_exit.go:204] [ 1653(17011): 1653(17011)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.518544 711557 task_signals.go:204] [ 1653(17011): 1654(17012)] Signal 1653, PID: 1654, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:33.518829 711557 task_exit.go:204] [ 1653(17011): 1654(17012)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:33.526249 711557 task_exit.go:204] [ 1653(17011): 1654(17012)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:33.526365 711557 task_exit.go:204] [ 1653(17011): 1654(17012)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:33.526505 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:33.528234 711557 task_exit.go:204] [ 1653(17011): 1653(17011)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.113243 711557 usertrap_amd64.go:212] [ 1637(15760): 1637(15760)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:34.113328 711557 usertrap_amd64.go:122] [ 1637(15760): 1637(15760)] Allocate a new trap: 0xc008918c90 45 D0706 16:21:34.113400 711557 usertrap_amd64.go:225] [ 1637(15760): 1637(15760)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:34.115388 711557 task_exit.go:204] [ 1637(15760): 1637(15760)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.115569 711557 task_exit.go:204] [ 1637(15760): 1637(15760)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.115731 711557 task_signals.go:204] [ 1637(15760): 1639(15761)] Signal 1637, PID: 1639, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.115796 711557 task_exit.go:204] [ 1637(15760): 1639(15761)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.115938 711557 task_exit.go:204] [ 1637(15760): 1639(15761)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.115970 711557 task_exit.go:204] [ 1637(15760): 1639(15761)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.116151 711557 task_signals.go:204] [ 1637(15760): 1647(15762)] Signal 1637, PID: 1647, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.116210 711557 task_exit.go:204] [ 1637(15760): 1647(15762)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.124507 711557 task_exit.go:204] [ 1637(15760): 1647(15762)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.124587 711557 task_exit.go:204] [ 1637(15760): 1647(15762)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.124654 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:34.125022 711557 task_exit.go:204] [ 1637(15760): 1637(15760)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:34 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:34 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:34 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x64, 0xa3, 0x8) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r2) socket$inet(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r3, 0x0) ioctl$TIOCGPTLCK(r3, 0x541b, &(0x7f0000000040)) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r4, r5, 0x0) ioctl$TIOCGPTLCK(r5, 0x541b, &(0x7f0000000040)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f00000000c0)={0x0, 'veth0_to_hsr\x00', {}, 0x9}) fallocate(r3, 0x42, 0x7, 0x1) 16:21:34 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) fcntl$dupfd(r0, 0x406, r0) (async) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x1, 0x1}, 0x46}}, 0x18) (async) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x1, 0x1}, 0x46}}, 0x18) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0xf33c, 0x66, 0xffffffffffffffff, 0x3, 0x24, 0x5, 0x3, 0x7, 0x4, 0x7, 0x6, 0x81, 0x2, 0x2}, 0x10, [0x0, 0x0]}) dup(0xffffffffffffffff) (async) r2 = dup(0xffffffffffffffff) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x37e) ppoll(&(0x7f0000000140)=[{r2, 0xc}, {0xffffffffffffffff, 0x404}, {r3, 0x4005}, {r1, 0x20}], 0x4, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0xa47]}, 0x8) clock_getres(0x2, &(0x7f0000000200)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/power_supply', 0x1, 0x8899b847d18801e3) write$P9_RSTAT(r4, &(0x7f0000000280)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0xfff, 0x200, {0x4, 0x4, 0x8}, 0xa5040000, 0x0, 0x5, 0x1ff, 0xa, '/dev/full\x00', 0x7, '+})#+\xdc$', 0xa, '/dev/full\x00', 0xa, '/dev/full\x00'}}, 0x5f) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x694000, 0x48) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x694000, 0x48) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000340)=0x5, 0x4) dup(r1) (async) dup(r1) fremovexattr(r3, &(0x7f0000000380)=@random={'btrfs.', '+})#+\xdc$'}) close(0xffffffffffffffff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r6 = timerfd_create(0x3, 0x80000) sync_file_range(r6, 0x1, 0x6, 0x0) mkdirat(r4, &(0x7f00000003c0)='./file0\x00', 0x5) (async) mkdirat(r4, &(0x7f00000003c0)='./file0\x00', 0x5) r7 = mq_open(&(0x7f0000000400)='+})#+\xdc$', 0x800, 0x81, &(0x7f0000000440)={0x7, 0x0, 0x20}) ppoll(&(0x7f0000000480)=[{r0, 0x42d8}, {r2, 0x2200}, {r4, 0x1089}, {r7, 0xa004}, {r0, 0x221}], 0x5, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500)={[0xfffffffffffffff7]}, 0x8) mount$9p_rdma(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x80c020, &(0x7f0000000600)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0xffffffff}}, {@timeout={'timeout', 0x3d, 0x40}}, {@rq={'rq', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0x6}}, {@common=@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}], [{@euid_eq={'euid', 0x3d, 0xee01}}]}}) accept4$inet6(r2, 0x0, &(0x7f0000000700), 0x80000) (async) r8 = accept4$inet6(r2, 0x0, &(0x7f0000000700), 0x80000) dup2(r8, r2) timer_create(0x5, &(0x7f0000000740)={0x0, 0x15, 0x2}, &(0x7f0000000780)) (async) timer_create(0x5, &(0x7f0000000740)={0x0, 0x15, 0x2}, &(0x7f0000000780)) openat$cgroup_ro(r5, &(0x7f00000007c0)='memory.events\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f0000000800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mq_open(&(0x7f0000000a40)='\x00', 0x40, 0x45, &(0x7f0000000a80)={0x9d6, 0x0, 0x1, 0xbbd}) (async) mq_open(&(0x7f0000000a40)='\x00', 0x40, 0x45, &(0x7f0000000a80)={0x9d6, 0x0, 0x1, 0xbbd}) openat$incfs(0xffffffffffffffff, &(0x7f0000000ac0)='.pending_reads\x00', 0x40000, 0x80) D0706 16:21:34.158385 711557 usertrap_amd64.go:212] [ 1656(17891): 1656(17891)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:34.158494 711557 usertrap_amd64.go:122] [ 1656(17891): 1656(17891)] Allocate a new trap: 0xc1e5771a40 40 D0706 16:21:34.159149 711557 usertrap_amd64.go:225] [ 1656(17891): 1656(17891)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:34.169145 711557 usertrap_amd64.go:212] [ 1658(17013): 1658(17013)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:34.169278 711557 usertrap_amd64.go:122] [ 1658(17013): 1658(17013)] Allocate a new trap: 0xc008918d20 40 D0706 16:21:34.170188 711557 usertrap_amd64.go:225] [ 1658(17013): 1658(17013)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:34.172453 711557 usertrap_amd64.go:212] [ 1657(15763): 1657(15763)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:34.172652 711557 usertrap_amd64.go:122] [ 1657(15763): 1657(15763)] Allocate a new trap: 0xc2f1c5e510 40 D0706 16:21:34.173282 711557 usertrap_amd64.go:212] [ 1655(16422): 1655(16422)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:34.173368 711557 usertrap_amd64.go:122] [ 1655(16422): 1655(16422)] Allocate a new trap: 0xc00c2113b0 40 D0706 16:21:34.173915 711557 usertrap_amd64.go:225] [ 1657(15763): 1657(15763)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:34.174010 711557 usertrap_amd64.go:212] [ 1656(17891): 1656(17891)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:34.174094 711557 usertrap_amd64.go:122] [ 1656(17891): 1656(17891)] Allocate a new trap: 0xc1e5771a40 41 D0706 16:21:34.174157 711557 usertrap_amd64.go:225] [ 1656(17891): 1656(17891)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:34.174971 711557 usertrap_amd64.go:225] [ 1655(16422): 1655(16422)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:34.175845 711557 usertrap_amd64.go:212] [ 1658(17013): 1658(17013)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:34.175906 711557 usertrap_amd64.go:122] [ 1658(17013): 1658(17013)] Allocate a new trap: 0xc008918d20 41 D0706 16:21:34.176029 711557 usertrap_amd64.go:225] [ 1658(17013): 1658(17013)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:34.179552 711557 usertrap_amd64.go:212] [ 1655(16422): 1655(16422)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:34.179621 711557 usertrap_amd64.go:122] [ 1655(16422): 1655(16422)] Allocate a new trap: 0xc00c2113b0 41 D0706 16:21:34.179683 711557 usertrap_amd64.go:225] [ 1655(16422): 1655(16422)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:34.201628 711557 usertrap_amd64.go:212] [ 1657(15763): 1657(15763)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:34.201719 711557 usertrap_amd64.go:122] [ 1657(15763): 1657(15763)] Allocate a new trap: 0xc2f1c5e510 41 D0706 16:21:34.201778 711557 usertrap_amd64.go:225] [ 1657(15763): 1657(15763)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:34.203161 711557 usertrap_amd64.go:212] [ 1656(17891): 1656(17891)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:34.203276 711557 usertrap_amd64.go:122] [ 1656(17891): 1656(17891)] Allocate a new trap: 0xc1e5771a40 42 D0706 16:21:34.203488 711557 usertrap_amd64.go:225] [ 1656(17891): 1656(17891)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:34.222092 711557 usertrap_amd64.go:212] [ 1658(17013): 1658(17013)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:34.222176 711557 usertrap_amd64.go:122] [ 1658(17013): 1658(17013)] Allocate a new trap: 0xc008918d20 42 D0706 16:21:34.222273 711557 usertrap_amd64.go:225] [ 1658(17013): 1658(17013)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:34.224860 711557 usertrap_amd64.go:212] [ 1655(16422): 1655(16422)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:34.224936 711557 usertrap_amd64.go:122] [ 1655(16422): 1655(16422)] Allocate a new trap: 0xc00c2113b0 42 D0706 16:21:34.225097 711557 usertrap_amd64.go:225] [ 1655(16422): 1655(16422)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:34.225946 711557 usertrap_amd64.go:212] [ 1657(15763): 1657(15763)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:34.225998 711557 usertrap_amd64.go:122] [ 1657(15763): 1657(15763)] Allocate a new trap: 0xc2f1c5e510 42 D0706 16:21:34.226093 711557 usertrap_amd64.go:225] [ 1657(15763): 1657(15763)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:34.240740 711557 usertrap_amd64.go:212] [ 1658(17013): 1662(17014)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:34.240882 711557 usertrap_amd64.go:122] [ 1658(17013): 1662(17014)] Allocate a new trap: 0xc008918d20 43 D0706 16:21:34.241044 711557 usertrap_amd64.go:225] [ 1658(17013): 1662(17014)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:34.244797 711557 usertrap_amd64.go:212] [ 1657(15763): 1661(15764)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:34.244884 711557 usertrap_amd64.go:122] [ 1657(15763): 1661(15764)] Allocate a new trap: 0xc2f1c5e510 43 D0706 16:21:34.244967 711557 usertrap_amd64.go:225] [ 1657(15763): 1661(15764)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:34.253596 711557 usertrap_amd64.go:212] [ 1658(17013): 1658(17013)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:34.253737 711557 usertrap_amd64.go:122] [ 1658(17013): 1658(17013)] Allocate a new trap: 0xc008918d20 44 D0706 16:21:34.253855 711557 usertrap_amd64.go:225] [ 1658(17013): 1658(17013)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:34.256289 711557 task_exit.go:204] [ 1658(17013): 1658(17013)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.256467 711557 task_exit.go:204] [ 1658(17013): 1658(17013)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.256603 711557 task_signals.go:204] [ 1658(17013): 1662(17014)] Signal 1658, PID: 1662, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.256709 711557 task_exit.go:204] [ 1658(17013): 1662(17014)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.263849 711557 task_exit.go:204] [ 1658(17013): 1662(17014)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.264131 711557 task_exit.go:204] [ 1658(17013): 1662(17014)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.264275 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:34.265308 711557 task_exit.go:204] [ 1658(17013): 1658(17013)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:34 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:34.288432 711557 usertrap_amd64.go:212] [ 1655(16422): 1655(16422)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:34.288511 711557 usertrap_amd64.go:122] [ 1655(16422): 1655(16422)] Allocate a new trap: 0xc00c2113b0 43 D0706 16:21:34.288613 711557 usertrap_amd64.go:225] [ 1655(16422): 1655(16422)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:34.293103 711557 task_exit.go:204] [ 1655(16422): 1655(16422)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.293298 711557 task_signals.go:204] [ 1655(16422): 1663(16424)] Signal 1655, PID: 1663, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.293267 711557 task_signals.go:204] [ 1655(16422): 1660(16423)] Signal 1655, PID: 1660, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.293382 711557 task_exit.go:204] [ 1655(16422): 1663(16424)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.293630 711557 task_exit.go:204] [ 1655(16422): 1660(16423)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.293893 711557 task_exit.go:204] [ 1655(16422): 1660(16423)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.293938 711557 task_exit.go:204] [ 1655(16422): 1660(16423)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.294313 711557 task_exit.go:204] [ 1655(16422): 1663(16424)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.294371 711557 task_exit.go:204] [ 1655(16422): 1663(16424)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.301871 711557 task_exit.go:204] [ 1655(16422): 1655(16422)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.301989 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:34.303642 711557 task_exit.go:204] [ 1655(16422): 1655(16422)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:34 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) (async) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x1, 0x1}, 0x46}}, 0x18) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0xf33c, 0x66, 0xffffffffffffffff, 0x3, 0x24, 0x5, 0x3, 0x7, 0x4, 0x7, 0x6, 0x81, 0x2, 0x2}, 0x10, [0x0, 0x0]}) r2 = dup(0xffffffffffffffff) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x37e) ppoll(&(0x7f0000000140)=[{r2, 0xc}, {0xffffffffffffffff, 0x404}, {r3, 0x4005}, {r1, 0x20}], 0x4, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0xa47]}, 0x8) (async) clock_getres(0x2, &(0x7f0000000200)) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/power_supply', 0x1, 0x8899b847d18801e3) write$P9_RSTAT(r4, &(0x7f0000000280)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0xfff, 0x200, {0x4, 0x4, 0x8}, 0xa5040000, 0x0, 0x5, 0x1ff, 0xa, '/dev/full\x00', 0x7, '+})#+\xdc$', 0xa, '/dev/full\x00', 0xa, '/dev/full\x00'}}, 0x5f) r5 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x694000, 0x48) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000340)=0x5, 0x4) (async) dup(r1) (async) fremovexattr(r3, &(0x7f0000000380)=@random={'btrfs.', '+})#+\xdc$'}) close(0xffffffffffffffff) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) (async) r6 = timerfd_create(0x3, 0x80000) sync_file_range(r6, 0x1, 0x6, 0x0) (async) mkdirat(r4, &(0x7f00000003c0)='./file0\x00', 0x5) r7 = mq_open(&(0x7f0000000400)='+})#+\xdc$', 0x800, 0x81, &(0x7f0000000440)={0x7, 0x0, 0x20}) ppoll(&(0x7f0000000480)=[{r0, 0x42d8}, {r2, 0x2200}, {r4, 0x1089}, {r7, 0xa004}, {r0, 0x221}], 0x5, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500)={[0xfffffffffffffff7]}, 0x8) (async) mount$9p_rdma(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x80c020, &(0x7f0000000600)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0xffffffff}}, {@timeout={'timeout', 0x3d, 0x40}}, {@rq={'rq', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0x6}}, {@common=@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}], [{@euid_eq={'euid', 0x3d, 0xee01}}]}}) r8 = accept4$inet6(r2, 0x0, &(0x7f0000000700), 0x80000) dup2(r8, r2) timer_create(0x5, &(0x7f0000000740)={0x0, 0x15, 0x2}, &(0x7f0000000780)) (async) openat$cgroup_ro(r5, &(0x7f00000007c0)='memory.events\x00', 0x0, 0x0) (async) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f0000000800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) mq_open(&(0x7f0000000a40)='\x00', 0x40, 0x45, &(0x7f0000000a80)={0x9d6, 0x0, 0x1, 0xbbd}) (async) openat$incfs(0xffffffffffffffff, &(0x7f0000000ac0)='.pending_reads\x00', 0x40000, 0x80) D0706 16:21:34.330357 711557 usertrap_amd64.go:212] [ 1657(15763): 1657(15763)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:34.330438 711557 usertrap_amd64.go:122] [ 1657(15763): 1657(15763)] Allocate a new trap: 0xc2f1c5e510 44 D0706 16:21:34.330560 711557 usertrap_amd64.go:225] [ 1657(15763): 1657(15763)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:34.375774 711557 usertrap_amd64.go:212] [ 1656(17891): 1667(17895)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:34.375851 711557 usertrap_amd64.go:122] [ 1656(17891): 1667(17895)] Allocate a new trap: 0xc1e5771a40 43 D0706 16:21:34.375918 711557 usertrap_amd64.go:225] [ 1656(17891): 1667(17895)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:34.386958 711557 usertrap_amd64.go:212] [ 1656(17891): 1656(17891)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:34.387084 711557 usertrap_amd64.go:122] [ 1656(17891): 1656(17891)] Allocate a new trap: 0xc1e5771a40 44 D0706 16:21:34.387155 711557 usertrap_amd64.go:225] [ 1656(17891): 1656(17891)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:34.762145 711557 usertrap_amd64.go:212] [ 1656(17891): 1656(17891)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:34.762435 711557 usertrap_amd64.go:122] [ 1656(17891): 1656(17891)] Allocate a new trap: 0xc1e5771a40 45 D0706 16:21:34.762585 711557 usertrap_amd64.go:225] [ 1656(17891): 1656(17891)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:34.767107 711557 task_exit.go:204] [ 1656(17891): 1656(17891)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.767477 711557 task_signals.go:204] [ 1656(17891): 1667(17895)] Signal 1656, PID: 1667, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.767618 711557 task_signals.go:204] [ 1656(17891): 1665(17894)] Signal 1656, PID: 1665, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.767845 711557 task_exit.go:204] [ 1656(17891): 1667(17895)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.768107 711557 task_signals.go:204] [ 1656(17891): 1659(17892)] Signal 1656, PID: 1659, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.768458 711557 task_signals.go:204] [ 1656(17891): 1664(17893)] Signal 1656, PID: 1664, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.768558 711557 task_exit.go:204] [ 1656(17891): 1667(17895)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.768681 711557 task_exit.go:204] [ 1656(17891): 1667(17895)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.769113 711557 task_exit.go:204] [ 1656(17891): 1656(17891)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.769403 711557 task_exit.go:204] [ 1656(17891): 1664(17893)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.769768 711557 task_exit.go:204] [ 1656(17891): 1664(17893)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.769857 711557 task_exit.go:204] [ 1656(17891): 1664(17893)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.770411 711557 task_exit.go:204] [ 1656(17891): 1665(17894)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.770632 711557 task_exit.go:204] [ 1656(17891): 1659(17892)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.771099 711557 task_exit.go:204] [ 1656(17891): 1659(17892)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.771185 711557 task_exit.go:204] [ 1656(17891): 1659(17892)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.784163 711557 task_exit.go:204] [ 1656(17891): 1665(17894)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.784222 711557 task_exit.go:204] [ 1656(17891): 1665(17894)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.784358 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:34.785241 711557 task_exit.go:204] [ 1656(17891): 1656(17891)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:34 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x64, 0xa3, 0x8) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r2) socket$inet(0x2, 0x1, 0x0) (async) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, 0x0, 0x0) (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r3, 0x0) ioctl$TIOCGPTLCK(r3, 0x541b, &(0x7f0000000040)) (async) r4 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r4, r5, 0x0) (async) ioctl$TIOCGPTLCK(r5, 0x541b, &(0x7f0000000040)) (async) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f00000000c0)={0x0, 'veth0_to_hsr\x00', {}, 0x9}) fallocate(r3, 0x42, 0x7, 0x1) D0706 16:21:34.864325 711557 usertrap_amd64.go:212] [ 1668(17015): 1668(17015)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:34.864450 711557 usertrap_amd64.go:122] [ 1668(17015): 1668(17015)] Allocate a new trap: 0xc008918d80 40 D0706 16:21:34.869002 711557 usertrap_amd64.go:225] [ 1668(17015): 1668(17015)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:34.870780 711557 usertrap_amd64.go:212] [ 1669(16425): 1669(16425)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:34.870984 711557 usertrap_amd64.go:122] [ 1669(16425): 1669(16425)] Allocate a new trap: 0xc008918db0 40 D0706 16:21:34.872184 711557 usertrap_amd64.go:225] [ 1669(16425): 1669(16425)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:34.877346 711557 usertrap_amd64.go:212] [ 1668(17015): 1668(17015)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:34.877474 711557 usertrap_amd64.go:122] [ 1668(17015): 1668(17015)] Allocate a new trap: 0xc008918d80 41 D0706 16:21:34.877551 711557 usertrap_amd64.go:225] [ 1668(17015): 1668(17015)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:34.878293 711557 usertrap_amd64.go:212] [ 1669(16425): 1669(16425)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:34.878414 711557 usertrap_amd64.go:122] [ 1669(16425): 1669(16425)] Allocate a new trap: 0xc008918db0 41 D0706 16:21:34.878484 711557 usertrap_amd64.go:225] [ 1669(16425): 1669(16425)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:34.897921 711557 usertrap_amd64.go:212] [ 1670(17896): 1670(17896)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:34.898016 711557 usertrap_amd64.go:122] [ 1670(17896): 1670(17896)] Allocate a new trap: 0xc0038edcb0 40 D0706 16:21:34.898918 711557 usertrap_amd64.go:225] [ 1670(17896): 1670(17896)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:34.905798 711557 usertrap_amd64.go:212] [ 1669(16425): 1669(16425)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:34.905864 711557 usertrap_amd64.go:122] [ 1669(16425): 1669(16425)] Allocate a new trap: 0xc008918db0 42 D0706 16:21:34.905958 711557 usertrap_amd64.go:225] [ 1669(16425): 1669(16425)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:34.911843 711557 usertrap_amd64.go:212] [ 1668(17015): 1668(17015)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:34.911929 711557 usertrap_amd64.go:122] [ 1668(17015): 1668(17015)] Allocate a new trap: 0xc008918d80 42 D0706 16:21:34.911988 711557 usertrap_amd64.go:225] [ 1668(17015): 1668(17015)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:34.913207 711557 usertrap_amd64.go:212] [ 1670(17896): 1670(17896)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:34.913354 711557 usertrap_amd64.go:122] [ 1670(17896): 1670(17896)] Allocate a new trap: 0xc0038edcb0 41 D0706 16:21:34.913507 711557 usertrap_amd64.go:225] [ 1670(17896): 1670(17896)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:34.927988 711557 usertrap_amd64.go:212] [ 1668(17015): 1672(17016)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:34.928091 711557 usertrap_amd64.go:122] [ 1668(17015): 1672(17016)] Allocate a new trap: 0xc008918d80 43 D0706 16:21:34.928157 711557 usertrap_amd64.go:225] [ 1668(17015): 1672(17016)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:34.938011 711557 usertrap_amd64.go:212] [ 1669(16425): 1669(16425)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:34.938075 711557 usertrap_amd64.go:122] [ 1669(16425): 1669(16425)] Allocate a new trap: 0xc008918db0 43 D0706 16:21:34.938140 711557 usertrap_amd64.go:225] [ 1669(16425): 1669(16425)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:34.950073 711557 usertrap_amd64.go:212] [ 1670(17896): 1670(17896)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:34.950170 711557 usertrap_amd64.go:122] [ 1670(17896): 1670(17896)] Allocate a new trap: 0xc0038edcb0 42 D0706 16:21:34.950304 711557 usertrap_amd64.go:225] [ 1670(17896): 1670(17896)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:34.952259 711557 task_exit.go:204] [ 1669(16425): 1669(16425)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.952431 711557 task_signals.go:204] [ 1669(16425): 1675(16429)] Signal 1669, PID: 1675, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.952471 711557 task_signals.go:204] [ 1669(16425): 1671(16426)] Signal 1669, PID: 1671, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.952616 711557 task_signals.go:204] [ 1669(16425): 1673(16427)] Signal 1669, PID: 1673, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.952663 711557 task_exit.go:204] [ 1669(16425): 1671(16426)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.952803 711557 task_signals.go:204] [ 1669(16425): 1676(16430)] Signal 1669, PID: 1676, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.952899 711557 task_exit.go:204] [ 1669(16425): 1676(16430)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.953061 711557 task_signals.go:204] [ 1669(16425): 1674(16428)] Signal 1669, PID: 1674, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.953170 711557 task_exit.go:204] [ 1669(16425): 1674(16428)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.953275 711557 usertrap_amd64.go:212] [ 1668(17015): 1668(17015)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:34.953354 711557 usertrap_amd64.go:122] [ 1668(17015): 1668(17015)] Allocate a new trap: 0xc008918d80 44 D0706 16:21:34.953397 711557 task_exit.go:204] [ 1669(16425): 1674(16428)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.953447 711557 task_exit.go:204] [ 1669(16425): 1674(16428)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.953472 711557 usertrap_amd64.go:225] [ 1668(17015): 1668(17015)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:34.953582 711557 task_exit.go:204] [ 1669(16425): 1669(16425)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.953673 711557 task_exit.go:204] [ 1669(16425): 1676(16430)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.953729 711557 task_exit.go:204] [ 1669(16425): 1676(16430)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.953977 711557 task_exit.go:204] [ 1669(16425): 1675(16429)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.954075 711557 task_exit.go:204] [ 1669(16425): 1673(16427)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.955916 711557 task_exit.go:204] [ 1669(16425): 1671(16426)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.955980 711557 task_exit.go:204] [ 1669(16425): 1671(16426)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.956084 711557 task_exit.go:204] [ 1669(16425): 1673(16427)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.956142 711557 task_exit.go:204] [ 1669(16425): 1673(16427)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.957850 711557 task_exit.go:204] [ 1668(17015): 1668(17015)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.958384 711557 task_signals.go:204] [ 1668(17015): 1672(17016)] Signal 1668, PID: 1672, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:34.958508 711557 task_exit.go:204] [ 1668(17015): 1672(17016)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:34.958738 711557 task_exit.go:204] [ 1668(17015): 1668(17015)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.966499 711557 task_exit.go:204] [ 1668(17015): 1672(17016)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.969026 711557 task_exit.go:204] [ 1668(17015): 1672(17016)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.970393 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:34.970721 711557 task_exit.go:204] [ 1668(17015): 1668(17015)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:34 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:34.981161 711557 task_exit.go:204] [ 1669(16425): 1675(16429)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:34.981270 711557 task_exit.go:204] [ 1669(16425): 1675(16429)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:34.981385 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:34.982051 711557 task_exit.go:204] [ 1669(16425): 1669(16425)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.049625 711557 usertrap_amd64.go:212] [ 1657(15763): 1657(15763)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:35.049716 711557 usertrap_amd64.go:122] [ 1657(15763): 1657(15763)] Allocate a new trap: 0xc2f1c5e510 45 D0706 16:21:35.049849 711557 usertrap_amd64.go:225] [ 1657(15763): 1657(15763)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:35.051849 711557 task_exit.go:204] [ 1657(15763): 1657(15763)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.052207 711557 task_exit.go:204] [ 1657(15763): 1657(15763)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.052202 711557 task_signals.go:204] [ 1657(15763): 1666(15765)] Signal 1657, PID: 1666, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.052566 711557 task_signals.go:204] [ 1657(15763): 1661(15764)] Signal 1657, PID: 1661, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.052764 711557 task_exit.go:204] [ 1657(15763): 1666(15765)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.053070 711557 task_exit.go:204] [ 1657(15763): 1661(15764)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.053241 711557 task_exit.go:204] [ 1657(15763): 1666(15765)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.053313 711557 task_exit.go:204] [ 1657(15763): 1666(15765)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.062298 711557 task_exit.go:204] [ 1657(15763): 1661(15764)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.062375 711557 task_exit.go:204] [ 1657(15763): 1661(15764)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.062510 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:35.063006 711557 task_exit.go:204] [ 1657(15763): 1657(15763)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:35 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:35 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000400), 0x8) r1 = signalfd(r0, &(0x7f0000000400)={[0x3]}, 0x8) write$binfmt_script(r1, 0x0, 0x0) D0706 16:21:35.086466 711557 usertrap_amd64.go:212] [ 1670(17896): 1682(17902)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:35.086538 711557 usertrap_amd64.go:122] [ 1670(17896): 1682(17902)] Allocate a new trap: 0xc0038edcb0 43 D0706 16:21:35.086624 711557 usertrap_amd64.go:225] [ 1670(17896): 1682(17902)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:35.111630 711557 usertrap_amd64.go:212] [ 1670(17896): 1670(17896)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:35.111705 711557 usertrap_amd64.go:122] [ 1670(17896): 1670(17896)] Allocate a new trap: 0xc0038edcb0 44 D0706 16:21:35.111826 711557 usertrap_amd64.go:225] [ 1670(17896): 1670(17896)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:35.418559 711557 usertrap_amd64.go:212] [ 1670(17896): 1670(17896)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:35.418643 711557 usertrap_amd64.go:122] [ 1670(17896): 1670(17896)] Allocate a new trap: 0xc0038edcb0 45 D0706 16:21:35.418718 711557 usertrap_amd64.go:225] [ 1670(17896): 1670(17896)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:35.423484 711557 task_exit.go:204] [ 1670(17896): 1670(17896)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.423866 711557 task_exit.go:204] [ 1670(17896): 1670(17896)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.424064 711557 task_signals.go:204] [ 1670(17896): 1681(17901)] Signal 1670, PID: 1681, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.424074 711557 task_signals.go:204] [ 1670(17896): 1679(17899)] Signal 1670, PID: 1679, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.424127 711557 task_signals.go:204] [ 1670(17896): 1677(17897)] Signal 1670, PID: 1677, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.423895 711557 task_signals.go:204] [ 1670(17896): 1680(17900)] Signal 1670, PID: 1680, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.424190 711557 task_exit.go:204] [ 1670(17896): 1681(17901)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.424371 711557 task_exit.go:204] [ 1670(17896): 1679(17899)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.424628 711557 task_exit.go:204] [ 1670(17896): 1679(17899)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.424697 711557 task_exit.go:204] [ 1670(17896): 1679(17899)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.424847 711557 task_signals.go:204] [ 1670(17896): 1678(17898)] Signal 1670, PID: 1678, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.425053 711557 task_exit.go:204] [ 1670(17896): 1677(17897)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.425258 711557 task_signals.go:204] [ 1670(17896): 1682(17902)] Signal 1670, PID: 1682, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.425384 711557 task_exit.go:204] [ 1670(17896): 1677(17897)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.425440 711557 task_exit.go:204] [ 1670(17896): 1677(17897)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.425613 711557 task_exit.go:204] [ 1670(17896): 1680(17900)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.426104 711557 task_exit.go:204] [ 1670(17896): 1678(17898)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.426498 711557 task_exit.go:204] [ 1670(17896): 1678(17898)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.426643 711557 task_exit.go:204] [ 1670(17896): 1678(17898)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.427582 711557 task_exit.go:204] [ 1670(17896): 1682(17902)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.427742 711557 task_exit.go:204] [ 1670(17896): 1680(17900)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.427960 711557 task_exit.go:204] [ 1670(17896): 1680(17900)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.428143 711557 task_exit.go:204] [ 1670(17896): 1681(17901)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.428258 711557 task_exit.go:204] [ 1670(17896): 1681(17901)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.438954 711557 task_exit.go:204] [ 1670(17896): 1682(17902)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.439032 711557 task_exit.go:204] [ 1670(17896): 1682(17902)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.439121 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:35.440142 711557 task_exit.go:204] [ 1670(17896): 1670(17896)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:35 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x64, 0xa3, 0x8) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r2) socket$inet(0x2, 0x1, 0x0) (async) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, 0x0, 0x0) (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r3, 0x0) (async) ioctl$TIOCGPTLCK(r3, 0x541b, &(0x7f0000000040)) r4 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r4, r5, 0x0) (async) ioctl$TIOCGPTLCK(r5, 0x541b, &(0x7f0000000040)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f00000000c0)={0x0, 'veth0_to_hsr\x00', {}, 0x9}) fallocate(r3, 0x42, 0x7, 0x1) D0706 16:21:35.534763 711557 usertrap_amd64.go:212] [ 1684(16431): 1684(16431)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:35.534885 711557 usertrap_amd64.go:122] [ 1684(16431): 1684(16431)] Allocate a new trap: 0xc2f1c5e600 40 D0706 16:21:35.535779 711557 usertrap_amd64.go:225] [ 1684(16431): 1684(16431)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:35.538161 711557 usertrap_amd64.go:212] [ 1683(17017): 1683(17017)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:35.538269 711557 usertrap_amd64.go:122] [ 1683(17017): 1683(17017)] Allocate a new trap: 0xc00b3fa180 40 D0706 16:21:35.539431 711557 usertrap_amd64.go:225] [ 1683(17017): 1683(17017)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:35.553370 711557 usertrap_amd64.go:212] [ 1685(17903): 1685(17903)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:35.553478 711557 usertrap_amd64.go:122] [ 1685(17903): 1685(17903)] Allocate a new trap: 0xc017060390 40 D0706 16:21:35.554354 711557 usertrap_amd64.go:225] [ 1685(17903): 1685(17903)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:35.558697 711557 usertrap_amd64.go:212] [ 1685(17903): 1685(17903)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:35.558785 711557 usertrap_amd64.go:122] [ 1685(17903): 1685(17903)] Allocate a new trap: 0xc017060390 41 D0706 16:21:35.558855 711557 usertrap_amd64.go:225] [ 1685(17903): 1685(17903)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:35.559421 711557 usertrap_amd64.go:212] [ 1683(17017): 1683(17017)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:35.559564 711557 usertrap_amd64.go:122] [ 1683(17017): 1683(17017)] Allocate a new trap: 0xc00b3fa180 41 D0706 16:21:35.559753 711557 usertrap_amd64.go:225] [ 1683(17017): 1683(17017)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:35.562485 711557 usertrap_amd64.go:212] [ 1684(16431): 1684(16431)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:35.562570 711557 usertrap_amd64.go:122] [ 1684(16431): 1684(16431)] Allocate a new trap: 0xc2f1c5e600 41 D0706 16:21:35.562659 711557 usertrap_amd64.go:225] [ 1684(16431): 1684(16431)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:35.568273 711557 usertrap_amd64.go:212] [ 1686(15766): 1686(15766)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:35.568379 711557 usertrap_amd64.go:122] [ 1686(15766): 1686(15766)] Allocate a new trap: 0xc0038edd10 40 D0706 16:21:35.569242 711557 usertrap_amd64.go:225] [ 1686(15766): 1686(15766)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:35.578148 711557 usertrap_amd64.go:212] [ 1686(15766): 1686(15766)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:35.578232 711557 usertrap_amd64.go:122] [ 1686(15766): 1686(15766)] Allocate a new trap: 0xc0038edd10 41 D0706 16:21:35.578343 711557 usertrap_amd64.go:225] [ 1686(15766): 1686(15766)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:35.583686 711557 usertrap_amd64.go:212] [ 1683(17017): 1683(17017)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:35.583819 711557 usertrap_amd64.go:122] [ 1683(17017): 1683(17017)] Allocate a new trap: 0xc00b3fa180 42 D0706 16:21:35.583911 711557 usertrap_amd64.go:225] [ 1683(17017): 1683(17017)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:35.589091 711557 usertrap_amd64.go:212] [ 1685(17903): 1685(17903)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:35.589165 711557 usertrap_amd64.go:122] [ 1685(17903): 1685(17903)] Allocate a new trap: 0xc017060390 42 D0706 16:21:35.589277 711557 usertrap_amd64.go:225] [ 1685(17903): 1685(17903)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:35.598351 711557 usertrap_amd64.go:212] [ 1684(16431): 1684(16431)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:35.598480 711557 usertrap_amd64.go:122] [ 1684(16431): 1684(16431)] Allocate a new trap: 0xc2f1c5e600 42 D0706 16:21:35.598553 711557 usertrap_amd64.go:225] [ 1684(16431): 1684(16431)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:35.598973 711557 usertrap_amd64.go:212] [ 1683(17017): 1687(17018)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:35.599032 711557 usertrap_amd64.go:122] [ 1683(17017): 1687(17018)] Allocate a new trap: 0xc00b3fa180 43 D0706 16:21:35.599149 711557 usertrap_amd64.go:225] [ 1683(17017): 1687(17018)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:35.613637 711557 usertrap_amd64.go:212] [ 1685(17903): 1692(17907)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:35.613733 711557 usertrap_amd64.go:122] [ 1685(17903): 1692(17907)] Allocate a new trap: 0xc017060390 43 D0706 16:21:35.613811 711557 usertrap_amd64.go:225] [ 1685(17903): 1692(17907)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:35.623559 711557 usertrap_amd64.go:212] [ 1684(16431): 1684(16431)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:35.623626 711557 usertrap_amd64.go:122] [ 1684(16431): 1684(16431)] Allocate a new trap: 0xc2f1c5e600 43 D0706 16:21:35.623696 711557 usertrap_amd64.go:225] [ 1684(16431): 1684(16431)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:35.626542 711557 usertrap_amd64.go:212] [ 1686(15766): 1686(15766)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:35.626661 711557 usertrap_amd64.go:122] [ 1686(15766): 1686(15766)] Allocate a new trap: 0xc0038edd10 42 D0706 16:21:35.626758 711557 usertrap_amd64.go:225] [ 1686(15766): 1686(15766)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:35.631274 711557 task_signals.go:204] [ 1684(16431): 1689(16432)] Signal 1684, PID: 1689, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:35.631434 711557 task_exit.go:204] [ 1684(16431): 1689(16432)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.631659 711557 task_exit.go:204] [ 1684(16431): 1689(16432)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.631710 711557 task_exit.go:204] [ 1684(16431): 1689(16432)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:35.631840 711557 task_exit.go:204] [ 1684(16431): 1684(16431)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:35.633017 711557 usertrap_amd64.go:212] [ 1685(17903): 1685(17903)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:35.633102 711557 usertrap_amd64.go:122] [ 1685(17903): 1685(17903)] Allocate a new trap: 0xc017060390 44 D0706 16:21:35.633188 711557 usertrap_amd64.go:225] [ 1685(17903): 1685(17903)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:35.642839 711557 task_exit.go:204] [ 1684(16431): 1684(16431)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:35.642945 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:35.643921 711557 task_exit.go:204] [ 1684(16431): 1684(16431)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:35 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000400), 0x8) r1 = signalfd(r0, &(0x7f0000000400)={[0x3]}, 0x8) write$binfmt_script(r1, 0x0, 0x0) D0706 16:21:35.646649 711557 usertrap_amd64.go:212] [ 1686(15766): 1694(15767)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:35.649067 711557 usertrap_amd64.go:122] [ 1686(15766): 1694(15767)] Allocate a new trap: 0xc0038edd10 43 D0706 16:21:35.649256 711557 usertrap_amd64.go:225] [ 1686(15766): 1694(15767)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:35.674424 711557 usertrap_amd64.go:212] [ 1683(17017): 1683(17017)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:35.674596 711557 usertrap_amd64.go:122] [ 1683(17017): 1683(17017)] Allocate a new trap: 0xc00b3fa180 44 D0706 16:21:35.674812 711557 usertrap_amd64.go:225] [ 1683(17017): 1683(17017)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:35.724509 711557 usertrap_amd64.go:212] [ 1686(15766): 1686(15766)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:35.724632 711557 usertrap_amd64.go:122] [ 1686(15766): 1686(15766)] Allocate a new trap: 0xc0038edd10 44 D0706 16:21:35.724703 711557 usertrap_amd64.go:225] [ 1686(15766): 1686(15766)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:36.050668 711557 usertrap_amd64.go:212] [ 1683(17017): 1683(17017)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:36.050808 711557 usertrap_amd64.go:122] [ 1683(17017): 1683(17017)] Allocate a new trap: 0xc00b3fa180 45 D0706 16:21:36.050755 711557 usertrap_amd64.go:212] [ 1685(17903): 1685(17903)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:36.050922 711557 usertrap_amd64.go:225] [ 1683(17017): 1683(17017)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:36.050969 711557 usertrap_amd64.go:122] [ 1685(17903): 1685(17903)] Allocate a new trap: 0xc017060390 45 D0706 16:21:36.051079 711557 usertrap_amd64.go:225] [ 1685(17903): 1685(17903)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:36.054254 711557 task_exit.go:204] [ 1683(17017): 1683(17017)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.054423 711557 task_signals.go:204] [ 1683(17017): 1687(17018)] Signal 1683, PID: 1687, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.054502 711557 task_exit.go:204] [ 1683(17017): 1687(17018)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.054694 711557 task_exit.go:204] [ 1683(17017): 1683(17017)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.055150 711557 task_exit.go:204] [ 1685(17903): 1685(17903)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.055319 711557 task_signals.go:204] [ 1685(17903): 1691(17906)] Signal 1685, PID: 1691, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.055441 711557 task_signals.go:204] [ 1685(17903): 1690(17905)] Signal 1685, PID: 1690, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.055468 711557 task_signals.go:204] [ 1685(17903): 1692(17907)] Signal 1685, PID: 1692, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.055499 711557 task_exit.go:204] [ 1685(17903): 1691(17906)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.055682 711557 task_exit.go:204] [ 1685(17903): 1690(17905)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.055637 711557 task_signals.go:204] [ 1685(17903): 1688(17904)] Signal 1685, PID: 1688, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.055779 711557 task_exit.go:204] [ 1685(17903): 1688(17904)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.055919 711557 task_signals.go:204] [ 1685(17903): 1693(17908)] Signal 1685, PID: 1693, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.056142 711557 task_exit.go:204] [ 1685(17903): 1688(17904)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.056221 711557 task_exit.go:204] [ 1685(17903): 1688(17904)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.056770 711557 task_exit.go:204] [ 1685(17903): 1685(17903)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.056916 711557 task_exit.go:204] [ 1685(17903): 1692(17907)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.057215 711557 task_exit.go:204] [ 1685(17903): 1693(17908)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.057823 711557 task_exit.go:204] [ 1685(17903): 1691(17906)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.057888 711557 task_exit.go:204] [ 1685(17903): 1691(17906)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.058062 711557 task_exit.go:204] [ 1685(17903): 1692(17907)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.058136 711557 task_exit.go:204] [ 1685(17903): 1692(17907)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.058239 711557 task_exit.go:204] [ 1685(17903): 1690(17905)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.058311 711557 task_exit.go:204] [ 1685(17903): 1690(17905)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.067341 711557 task_exit.go:204] [ 1683(17017): 1687(17018)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.067457 711557 task_exit.go:204] [ 1683(17017): 1687(17018)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.067586 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:36.067950 711557 task_exit.go:204] [ 1683(17017): 1683(17017)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.068260 711557 task_exit.go:204] [ 1685(17903): 1693(17908)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.068317 711557 task_exit.go:204] [ 1685(17903): 1693(17908)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.068405 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:36.068714 711557 task_exit.go:204] [ 1685(17903): 1685(17903)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:36 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:36 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) dup3(r2, r0, 0x80000) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:36.206874 711557 usertrap_amd64.go:212] [ 1697(17909): 1697(17909)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:36.206989 711557 usertrap_amd64.go:122] [ 1697(17909): 1697(17909)] Allocate a new trap: 0xc008918ea0 40 D0706 16:21:36.207875 711557 usertrap_amd64.go:225] [ 1697(17909): 1697(17909)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:36.213762 711557 usertrap_amd64.go:212] [ 1698(17019): 1698(17019)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:36.214018 711557 usertrap_amd64.go:122] [ 1698(17019): 1698(17019)] Allocate a new trap: 0xc16ed8f5c0 40 D0706 16:21:36.214374 711557 usertrap_amd64.go:212] [ 1697(17909): 1697(17909)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:36.214482 711557 usertrap_amd64.go:122] [ 1697(17909): 1697(17909)] Allocate a new trap: 0xc008918ea0 41 D0706 16:21:36.214568 711557 usertrap_amd64.go:225] [ 1697(17909): 1697(17909)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:36.215173 711557 usertrap_amd64.go:225] [ 1698(17019): 1698(17019)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:36.218746 711557 usertrap_amd64.go:212] [ 1696(16433): 1696(16433)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:36.218838 711557 usertrap_amd64.go:122] [ 1696(16433): 1696(16433)] Allocate a new trap: 0xc0085108a0 40 D0706 16:21:36.219596 711557 usertrap_amd64.go:212] [ 1698(17019): 1698(17019)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:36.219725 711557 usertrap_amd64.go:225] [ 1696(16433): 1696(16433)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:36.219754 711557 usertrap_amd64.go:122] [ 1698(17019): 1698(17019)] Allocate a new trap: 0xc16ed8f5c0 41 D0706 16:21:36.220122 711557 usertrap_amd64.go:225] [ 1698(17019): 1698(17019)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:36.223692 711557 usertrap_amd64.go:212] [ 1696(16433): 1696(16433)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:36.223766 711557 usertrap_amd64.go:122] [ 1696(16433): 1696(16433)] Allocate a new trap: 0xc0085108a0 41 D0706 16:21:36.223838 711557 usertrap_amd64.go:225] [ 1696(16433): 1696(16433)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:36.243059 711557 usertrap_amd64.go:212] [ 1697(17909): 1697(17909)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:36.243283 711557 usertrap_amd64.go:122] [ 1697(17909): 1697(17909)] Allocate a new trap: 0xc008918ea0 42 D0706 16:21:36.243418 711557 usertrap_amd64.go:225] [ 1697(17909): 1697(17909)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:36.253361 711557 usertrap_amd64.go:212] [ 1696(16433): 1696(16433)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:36.253496 711557 usertrap_amd64.go:122] [ 1696(16433): 1696(16433)] Allocate a new trap: 0xc0085108a0 42 D0706 16:21:36.253572 711557 usertrap_amd64.go:225] [ 1696(16433): 1696(16433)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:36.261511 711557 usertrap_amd64.go:212] [ 1697(17909): 1699(17910)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:36.261590 711557 usertrap_amd64.go:122] [ 1697(17909): 1699(17910)] Allocate a new trap: 0xc008918ea0 43 D0706 16:21:36.261720 711557 usertrap_amd64.go:225] [ 1697(17909): 1699(17910)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:36.262385 711557 usertrap_amd64.go:212] [ 1696(16433): 1696(16433)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:36.262521 711557 usertrap_amd64.go:122] [ 1696(16433): 1696(16433)] Allocate a new trap: 0xc0085108a0 43 D0706 16:21:36.262614 711557 usertrap_amd64.go:225] [ 1696(16433): 1696(16433)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:36.263317 711557 usertrap_amd64.go:212] [ 1698(17019): 1698(17019)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:36.263383 711557 usertrap_amd64.go:122] [ 1698(17019): 1698(17019)] Allocate a new trap: 0xc16ed8f5c0 42 D0706 16:21:36.263463 711557 usertrap_amd64.go:225] [ 1698(17019): 1698(17019)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:36.270790 711557 usertrap_amd64.go:212] [ 1697(17909): 1697(17909)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:36.270907 711557 usertrap_amd64.go:122] [ 1697(17909): 1697(17909)] Allocate a new trap: 0xc008918ea0 44 D0706 16:21:36.271014 711557 usertrap_amd64.go:225] [ 1697(17909): 1697(17909)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:36.272182 711557 usertrap_amd64.go:212] [ 1698(17019): 1701(17020)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:36.272349 711557 usertrap_amd64.go:122] [ 1698(17019): 1701(17020)] Allocate a new trap: 0xc16ed8f5c0 43 D0706 16:21:36.272578 711557 usertrap_amd64.go:225] [ 1698(17019): 1701(17020)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:36.273351 711557 task_exit.go:204] [ 1696(16433): 1696(16433)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.273527 711557 task_signals.go:204] [ 1696(16433): 1700(16434)] Signal 1696, PID: 1700, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.273633 711557 task_exit.go:204] [ 1696(16433): 1700(16434)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.273938 711557 task_exit.go:204] [ 1696(16433): 1696(16433)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.275098 711557 task_exit.go:204] [ 1697(17909): 1697(17909)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.275208 711557 task_signals.go:204] [ 1697(17909): 1699(17910)] Signal 1697, PID: 1699, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.275329 711557 task_exit.go:204] [ 1697(17909): 1699(17910)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.275640 711557 task_exit.go:204] [ 1697(17909): 1699(17910)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.275730 711557 task_exit.go:204] [ 1697(17909): 1699(17910)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.282916 711557 task_exit.go:204] [ 1696(16433): 1700(16434)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.282969 711557 task_exit.go:204] [ 1696(16433): 1700(16434)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.283071 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:36.283960 711557 task_exit.go:204] [ 1696(16433): 1696(16433)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.284652 711557 task_exit.go:204] [ 1697(17909): 1697(17909)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.284722 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 16:21:36 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000400), 0x8) r1 = signalfd(r0, &(0x7f0000000400)={[0x3]}, 0x8) write$binfmt_script(r1, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400), 0x8) (async) signalfd(r0, &(0x7f0000000400)={[0x3]}, 0x8) (async) write$binfmt_script(r1, 0x0, 0x0) (async) D0706 16:21:36.285884 711557 task_exit.go:204] [ 1697(17909): 1697(17909)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.286395 711557 usertrap_amd64.go:212] [ 1698(17019): 1698(17019)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:36.286465 711557 usertrap_amd64.go:122] [ 1698(17019): 1698(17019)] Allocate a new trap: 0xc16ed8f5c0 44 D0706 16:21:36.286560 711557 usertrap_amd64.go:225] [ 1698(17019): 1698(17019)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) 16:21:36 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) (async) dup3(r1, r2, 0x0) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) dup3(r2, r0, 0x80000) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:36.293020 711557 task_exit.go:204] [ 1698(17019): 1698(17019)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.293176 711557 task_signals.go:204] [ 1698(17019): 1701(17020)] Signal 1698, PID: 1701, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.293285 711557 task_exit.go:204] [ 1698(17019): 1701(17020)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.293538 711557 task_exit.go:204] [ 1698(17019): 1701(17020)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.293592 711557 task_exit.go:204] [ 1698(17019): 1701(17020)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.303140 711557 task_exit.go:204] [ 1698(17019): 1698(17019)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.303259 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:36.304261 711557 task_exit.go:204] [ 1698(17019): 1698(17019)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.316750 711557 usertrap_amd64.go:212] [ 1702(16435): 1702(16435)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:36.316862 711557 usertrap_amd64.go:122] [ 1702(16435): 1702(16435)] Allocate a new trap: 0xc00c6d2420 40 D0706 16:21:36.317760 711557 usertrap_amd64.go:225] [ 1702(16435): 1702(16435)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:36.322460 711557 usertrap_amd64.go:212] [ 1702(16435): 1702(16435)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:36.322512 711557 usertrap_amd64.go:122] [ 1702(16435): 1702(16435)] Allocate a new trap: 0xc00c6d2420 41 D0706 16:21:36.322599 711557 usertrap_amd64.go:225] [ 1702(16435): 1702(16435)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:36.333693 711557 usertrap_amd64.go:212] [ 1703(17911): 1703(17911)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:36.333788 711557 usertrap_amd64.go:122] [ 1703(17911): 1703(17911)] Allocate a new trap: 0xc017060450 40 D0706 16:21:36.334661 711557 usertrap_amd64.go:225] [ 1703(17911): 1703(17911)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:36.338847 711557 usertrap_amd64.go:212] [ 1703(17911): 1703(17911)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:36.338954 711557 usertrap_amd64.go:122] [ 1703(17911): 1703(17911)] Allocate a new trap: 0xc017060450 41 D0706 16:21:36.339039 711557 usertrap_amd64.go:225] [ 1703(17911): 1703(17911)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:36.340424 711557 usertrap_amd64.go:212] [ 1702(16435): 1702(16435)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:36.340511 711557 usertrap_amd64.go:122] [ 1702(16435): 1702(16435)] Allocate a new trap: 0xc00c6d2420 42 D0706 16:21:36.340563 711557 usertrap_amd64.go:225] [ 1702(16435): 1702(16435)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:36.353085 711557 usertrap_amd64.go:212] [ 1702(16435): 1702(16435)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:36.353169 711557 usertrap_amd64.go:122] [ 1702(16435): 1702(16435)] Allocate a new trap: 0xc00c6d2420 43 D0706 16:21:36.353240 711557 usertrap_amd64.go:225] [ 1702(16435): 1702(16435)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:36.356831 711557 usertrap_amd64.go:212] [ 1702(16435): 1702(16435)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:36.357013 711557 usertrap_amd64.go:122] [ 1702(16435): 1702(16435)] Allocate a new trap: 0xc00c6d2420 44 D0706 16:21:36.357146 711557 usertrap_amd64.go:225] [ 1702(16435): 1702(16435)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:36.362562 711557 task_exit.go:204] [ 1702(16435): 1702(16435)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.362786 711557 task_signals.go:204] [ 1702(16435): 1705(16437)] Signal 1702, PID: 1705, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.362898 711557 task_signals.go:204] [ 1702(16435): 1704(16436)] Signal 1702, PID: 1704, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.362990 711557 task_exit.go:204] [ 1702(16435): 1704(16436)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.363128 711557 task_exit.go:204] [ 1702(16435): 1702(16435)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.363302 711557 task_exit.go:204] [ 1702(16435): 1705(16437)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.363566 711557 task_exit.go:204] [ 1702(16435): 1705(16437)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.363618 711557 task_exit.go:204] [ 1702(16435): 1705(16437)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.365248 711557 usertrap_amd64.go:212] [ 1703(17911): 1703(17911)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:36.365346 711557 usertrap_amd64.go:122] [ 1703(17911): 1703(17911)] Allocate a new trap: 0xc017060450 42 D0706 16:21:36.365647 711557 usertrap_amd64.go:225] [ 1703(17911): 1703(17911)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:36.371524 711557 task_exit.go:204] [ 1702(16435): 1704(16436)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.371592 711557 task_exit.go:204] [ 1702(16435): 1704(16436)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.371661 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:36.372337 711557 task_exit.go:204] [ 1702(16435): 1702(16435)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.372445 711557 usertrap_amd64.go:212] [ 1703(17911): 1706(17912)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:36.372493 711557 usertrap_amd64.go:122] [ 1703(17911): 1706(17912)] Allocate a new trap: 0xc017060450 43 D0706 16:21:36.372567 711557 usertrap_amd64.go:225] [ 1703(17911): 1706(17912)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:36.384684 711557 usertrap_amd64.go:212] [ 1703(17911): 1703(17911)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:36.384831 711557 usertrap_amd64.go:122] [ 1703(17911): 1703(17911)] Allocate a new trap: 0xc017060450 44 D0706 16:21:36.384933 711557 usertrap_amd64.go:225] [ 1703(17911): 1703(17911)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:36.389730 711557 task_exit.go:204] [ 1703(17911): 1703(17911)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.389980 711557 task_signals.go:204] [ 1703(17911): 1706(17912)] Signal 1703, PID: 1706, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.390103 711557 task_exit.go:204] [ 1703(17911): 1706(17912)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.390263 711557 task_signals.go:204] [ 1703(17911): 1707(17913)] Signal 1703, PID: 1707, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.390299 711557 task_exit.go:204] [ 1703(17911): 1703(17911)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.390684 711557 task_exit.go:204] [ 1703(17911): 1707(17913)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.391685 711557 task_exit.go:204] [ 1703(17911): 1706(17912)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.391757 711557 task_exit.go:204] [ 1703(17911): 1706(17912)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.399171 711557 task_exit.go:204] [ 1703(17911): 1707(17913)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.399245 711557 task_exit.go:204] [ 1703(17911): 1707(17913)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.399354 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:36.399482 711557 task_exit.go:204] [ 1703(17911): 1703(17911)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.433034 711557 usertrap_amd64.go:212] [ 1686(15766): 1686(15766)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:36.433190 711557 usertrap_amd64.go:122] [ 1686(15766): 1686(15766)] Allocate a new trap: 0xc0038edd10 45 D0706 16:21:36.433260 711557 usertrap_amd64.go:225] [ 1686(15766): 1686(15766)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:36.438305 711557 task_exit.go:204] [ 1686(15766): 1686(15766)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.438541 711557 task_signals.go:204] [ 1686(15766): 1694(15767)] Signal 1686, PID: 1694, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.438725 711557 task_signals.go:204] [ 1686(15766): 1695(15768)] Signal 1686, PID: 1695, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.438840 711557 task_exit.go:204] [ 1686(15766): 1694(15767)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.439004 711557 task_exit.go:204] [ 1686(15766): 1686(15766)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.439167 711557 task_exit.go:204] [ 1686(15766): 1695(15768)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.439516 711557 task_exit.go:204] [ 1686(15766): 1694(15767)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.439613 711557 task_exit.go:204] [ 1686(15766): 1694(15767)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.446770 711557 task_exit.go:204] [ 1686(15766): 1695(15768)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.446885 711557 task_exit.go:204] [ 1686(15766): 1695(15768)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.446996 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:36.447114 711557 task_exit.go:204] [ 1686(15766): 1686(15766)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:36 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:36 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:36 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r1, r2, 0x0) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) dup3(r2, r0, 0x80000) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') (async) dup3(r1, r2, 0x0) (async) ioctl$TIOCGPTLCK(r2, 0x541b, &(0x7f0000000040)) (async) dup3(r2, r0, 0x80000) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) 16:21:36 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x8000, 0x0) fdatasync(r0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/net', 0x602000, 0x40) sendto$inet(r1, &(0x7f0000000080)="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", 0x1000, 0x4040802, &(0x7f0000001080)={0x2, 0x4e24, @private=0xa010102}, 0x10) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000010c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000001100)=0x1c, 0x800) r3 = signalfd(r2, &(0x7f0000001140)={[0x2]}, 0x8) fsetxattr$security_evm(r2, &(0x7f0000001180), &(0x7f00000011c0)=@v1={0x2, "87e34a243c6356e2a513"}, 0xb, 0x0) close(r0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000001200)={0xe93, {{0x2, 0x4e24, @private=0xa010100}}, 0x1, 0x8, [{{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x33}}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @rand_addr=0x64010102}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x490) connect$inet(r1, &(0x7f00000016c0)={0x2, 0x4e23, @loopback}, 0x10) fcntl$notify(r3, 0x402, 0x8000002f) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, &(0x7f0000001700)=0x1000, r4, &(0x7f0000001740)=0x3ff, 0x2, 0x4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001780), 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000017c0)={0x7fff, 0x81, 0x6, 0x0, 0x0, [{{r0}, 0x7}, {{r4}, 0x200}, {{r5}, 0x7}, {{r1}, 0x7fff}, {{r0}}, {{r1}, 0x5}]}) r6 = signalfd4(r4, &(0x7f00000018c0)={[0x40]}, 0x8, 0x800) r7 = socket$inet_icmp(0x2, 0x2, 0x1) r8 = signalfd(r7, &(0x7f0000001900)={[0x7fff]}, 0x8) r9 = signalfd4(r8, &(0x7f0000001940)={[0x7fff]}, 0x8, 0x80000) fdatasync(r5) socket$inet6_tcp(0xa, 0x1, 0x0) r10 = eventfd(0x5) ioctl$EXT4_IOC_GET_ES_CACHE(r10, 0xc020662a, &(0x7f0000001980)={0x7a, 0x7, 0x1, 0xfffffffc, 0x1, [{0xf67, 0x1, 0x9751, '\x00', 0x84}]}) r11 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) fcntl$dupfd(r11, 0x406, r7) connect$inet(r9, &(0x7f0000001a00)={0x2, 0x4e24, @loopback}, 0x10) openat$cgroup_ro(r6, &(0x7f0000001a40)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r12 = ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) ioctl$TIOCGPGRP(r12, 0x540f, &(0x7f0000001a80)) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001bc0)={{}, 0x0, 0x8, @inherit={0x90, &(0x7f0000001b00)={0x0, 0x9, 0x9, 0x54, {0x60, 0xfffffffffffff800, 0x1, 0x81, 0xc7}, [0xfffffffffffffffe, 0x6, 0x35, 0x1000, 0x1, 0x8001, 0x2, 0x3f, 0xffffffff7fffffff]}}, @subvolid=0x4}) D0706 16:21:36.482100 711557 usertrap_amd64.go:212] [ 1708(16438): 1708(16438)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:36.482179 711557 usertrap_amd64.go:122] [ 1708(16438): 1708(16438)] Allocate a new trap: 0xc0170604e0 40 D0706 16:21:36.482829 711557 usertrap_amd64.go:225] [ 1708(16438): 1708(16438)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:36.482887 711557 usertrap_amd64.go:212] [ 1709(17914): 1709(17914)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:36.482961 711557 usertrap_amd64.go:122] [ 1709(17914): 1709(17914)] Allocate a new trap: 0xc0038eddd0 40 D0706 16:21:36.483803 711557 usertrap_amd64.go:212] [ 1710(17021): 1710(17021)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:36.483974 711557 usertrap_amd64.go:122] [ 1710(17021): 1710(17021)] Allocate a new trap: 0xc173599620 40 D0706 16:21:36.483820 711557 usertrap_amd64.go:225] [ 1709(17914): 1709(17914)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:36.484984 711557 usertrap_amd64.go:225] [ 1710(17021): 1710(17021)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:36.486465 711557 usertrap_amd64.go:212] [ 1708(16438): 1708(16438)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:36.486559 711557 usertrap_amd64.go:122] [ 1708(16438): 1708(16438)] Allocate a new trap: 0xc0170604e0 41 D0706 16:21:36.486642 711557 usertrap_amd64.go:225] [ 1708(16438): 1708(16438)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:36.488673 711557 usertrap_amd64.go:212] [ 1710(17021): 1710(17021)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:36.488863 711557 usertrap_amd64.go:122] [ 1710(17021): 1710(17021)] Allocate a new trap: 0xc173599620 41 D0706 16:21:36.489057 711557 usertrap_amd64.go:225] [ 1710(17021): 1710(17021)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:36.489208 711557 usertrap_amd64.go:212] [ 1709(17914): 1709(17914)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:36.489321 711557 usertrap_amd64.go:122] [ 1709(17914): 1709(17914)] Allocate a new trap: 0xc0038eddd0 41 D0706 16:21:36.489407 711557 usertrap_amd64.go:225] [ 1709(17914): 1709(17914)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:36.494169 711557 usertrap_amd64.go:212] [ 1711(15769): 1711(15769)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:36.494310 711557 usertrap_amd64.go:122] [ 1711(15769): 1711(15769)] Allocate a new trap: 0xc000475710 40 D0706 16:21:36.495150 711557 usertrap_amd64.go:225] [ 1711(15769): 1711(15769)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:36.501292 711557 usertrap_amd64.go:212] [ 1711(15769): 1711(15769)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:36.501384 711557 usertrap_amd64.go:122] [ 1711(15769): 1711(15769)] Allocate a new trap: 0xc000475710 41 D0706 16:21:36.501462 711557 usertrap_amd64.go:225] [ 1711(15769): 1711(15769)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:36.513149 711557 usertrap_amd64.go:212] [ 1709(17914): 1709(17914)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:36.513345 711557 usertrap_amd64.go:122] [ 1709(17914): 1709(17914)] Allocate a new trap: 0xc0038eddd0 42 D0706 16:21:36.513579 711557 usertrap_amd64.go:225] [ 1709(17914): 1709(17914)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:36.514611 711557 usertrap_amd64.go:212] [ 1708(16438): 1708(16438)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:36.514682 711557 usertrap_amd64.go:122] [ 1708(16438): 1708(16438)] Allocate a new trap: 0xc0170604e0 42 D0706 16:21:36.514762 711557 usertrap_amd64.go:225] [ 1708(16438): 1708(16438)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:36.520295 711557 usertrap_amd64.go:212] [ 1710(17021): 1710(17021)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:36.520436 711557 usertrap_amd64.go:122] [ 1710(17021): 1710(17021)] Allocate a new trap: 0xc173599620 42 D0706 16:21:36.520570 711557 usertrap_amd64.go:225] [ 1710(17021): 1710(17021)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:36.524228 711557 usertrap_amd64.go:212] [ 1711(15769): 1711(15769)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:36.524284 711557 usertrap_amd64.go:122] [ 1711(15769): 1711(15769)] Allocate a new trap: 0xc000475710 42 D0706 16:21:36.524332 711557 usertrap_amd64.go:225] [ 1711(15769): 1711(15769)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:36.525628 711557 usertrap_amd64.go:212] [ 1709(17914): 1712(17915)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:36.525734 711557 usertrap_amd64.go:122] [ 1709(17914): 1712(17915)] Allocate a new trap: 0xc0038eddd0 43 D0706 16:21:36.525843 711557 usertrap_amd64.go:225] [ 1709(17914): 1712(17915)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:36.528515 711557 usertrap_amd64.go:212] [ 1710(17021): 1714(17022)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:36.528574 711557 usertrap_amd64.go:122] [ 1710(17021): 1714(17022)] Allocate a new trap: 0xc173599620 43 D0706 16:21:36.528624 711557 usertrap_amd64.go:225] [ 1710(17021): 1714(17022)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:36.539066 711557 usertrap_amd64.go:212] [ 1710(17021): 1710(17021)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:36.539173 711557 usertrap_amd64.go:122] [ 1710(17021): 1710(17021)] Allocate a new trap: 0xc173599620 44 D0706 16:21:36.539364 711557 usertrap_amd64.go:225] [ 1710(17021): 1710(17021)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:36.544690 711557 task_signals.go:204] [ 1710(17021): 1714(17022)] Signal 1710, PID: 1714, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.544786 711557 task_exit.go:204] [ 1710(17021): 1710(17021)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.545103 711557 task_exit.go:204] [ 1710(17021): 1714(17022)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.545334 711557 task_exit.go:204] [ 1710(17021): 1710(17021)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.546204 711557 usertrap_amd64.go:212] [ 1711(15769): 1715(15770)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:36.546291 711557 usertrap_amd64.go:122] [ 1711(15769): 1715(15770)] Allocate a new trap: 0xc000475710 43 D0706 16:21:36.546411 711557 usertrap_amd64.go:225] [ 1711(15769): 1715(15770)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:36.553089 711557 usertrap_amd64.go:212] [ 1708(16438): 1708(16438)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:36.553255 711557 usertrap_amd64.go:122] [ 1708(16438): 1708(16438)] Allocate a new trap: 0xc0170604e0 43 D0706 16:21:36.553397 711557 usertrap_amd64.go:225] [ 1708(16438): 1708(16438)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:36.556119 711557 task_exit.go:204] [ 1710(17021): 1714(17022)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.556217 711557 task_exit.go:204] [ 1710(17021): 1714(17022)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.556269 711557 usertrap_amd64.go:212] [ 1709(17914): 1709(17914)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:36.556336 711557 usertrap_amd64.go:122] [ 1709(17914): 1709(17914)] Allocate a new trap: 0xc0038eddd0 44 D0706 16:21:36.556374 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:36.556528 711557 usertrap_amd64.go:225] [ 1709(17914): 1709(17914)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:36.557614 711557 task_exit.go:204] [ 1710(17021): 1710(17021)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.557916 711557 usertrap_amd64.go:212] [ 1709(17914): 1709(17914)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:36.557971 711557 usertrap_amd64.go:122] [ 1709(17914): 1709(17914)] Allocate a new trap: 0xc0038eddd0 45 D0706 16:21:36.558121 711557 usertrap_amd64.go:225] [ 1709(17914): 1709(17914)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) 16:21:36 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:36.563470 711557 task_exit.go:204] [ 1709(17914): 1709(17914)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.563662 711557 task_signals.go:204] [ 1709(17914): 1718(17918)] Signal 1709, PID: 1718, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.563736 711557 task_exit.go:204] [ 1709(17914): 1709(17914)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.563929 711557 task_signals.go:204] [ 1709(17914): 1712(17915)] Signal 1709, PID: 1712, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.564032 711557 task_exit.go:204] [ 1709(17914): 1712(17915)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.564176 711557 task_signals.go:204] [ 1709(17914): 1716(17916)] Signal 1709, PID: 1716, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.564297 711557 task_exit.go:204] [ 1708(16438): 1708(16438)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.564632 711557 task_signals.go:204] [ 1709(17914): 1717(17917)] Signal 1709, PID: 1717, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.564799 711557 task_signals.go:204] [ 1708(16438): 1713(16439)] Signal 1708, PID: 1713, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.564919 711557 task_exit.go:204] [ 1708(16438): 1708(16438)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.565076 711557 task_exit.go:204] [ 1709(17914): 1712(17915)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.565153 711557 task_exit.go:204] [ 1709(17914): 1712(17915)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.565290 711557 task_exit.go:204] [ 1709(17914): 1717(17917)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.565563 711557 task_exit.go:204] [ 1709(17914): 1717(17917)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.565624 711557 task_exit.go:204] [ 1709(17914): 1717(17917)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.565813 711557 task_exit.go:204] [ 1709(17914): 1718(17918)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.566021 711557 task_exit.go:204] [ 1709(17914): 1718(17918)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.566066 711557 task_exit.go:204] [ 1709(17914): 1718(17918)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.566153 711557 task_exit.go:204] [ 1709(17914): 1716(17916)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.566510 711557 task_exit.go:204] [ 1708(16438): 1713(16439)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.575543 711557 task_exit.go:204] [ 1709(17914): 1716(17916)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.575606 711557 task_exit.go:204] [ 1709(17914): 1716(17916)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.575738 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:36.577008 711557 task_exit.go:204] [ 1708(16438): 1713(16439)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.577219 711557 task_exit.go:204] [ 1708(16438): 1713(16439)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.577380 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:36.577597 711557 task_exit.go:204] [ 1708(16438): 1708(16438)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.577835 711557 task_exit.go:204] [ 1709(17914): 1709(17914)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:36 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x8000, 0x0) fdatasync(r0) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/net', 0x602000, 0x40) (rerun: 32) sendto$inet(r1, &(0x7f0000000080)="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", 0x1000, 0x4040802, &(0x7f0000001080)={0x2, 0x4e24, @private=0xa010102}, 0x10) (async, rerun: 32) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000010c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000001100)=0x1c, 0x800) (rerun: 32) r3 = signalfd(r2, &(0x7f0000001140)={[0x2]}, 0x8) (async, rerun: 64) fsetxattr$security_evm(r2, &(0x7f0000001180), &(0x7f00000011c0)=@v1={0x2, "87e34a243c6356e2a513"}, 0xb, 0x0) (async, rerun: 64) close(r0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000001200)={0xe93, {{0x2, 0x4e24, @private=0xa010100}}, 0x1, 0x8, [{{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x33}}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @rand_addr=0x64010102}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x490) (async, rerun: 32) connect$inet(r1, &(0x7f00000016c0)={0x2, 0x4e23, @loopback}, 0x10) (async, rerun: 32) fcntl$notify(r3, 0x402, 0x8000002f) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, &(0x7f0000001700)=0x1000, r4, &(0x7f0000001740)=0x3ff, 0x2, 0x4) (async, rerun: 32) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001780), 0x0, 0x0) (rerun: 32) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000017c0)={0x7fff, 0x81, 0x6, 0x0, 0x0, [{{r0}, 0x7}, {{r4}, 0x200}, {{r5}, 0x7}, {{r1}, 0x7fff}, {{r0}}, {{r1}, 0x5}]}) (async, rerun: 64) r6 = signalfd4(r4, &(0x7f00000018c0)={[0x40]}, 0x8, 0x800) (async, rerun: 64) r7 = socket$inet_icmp(0x2, 0x2, 0x1) r8 = signalfd(r7, &(0x7f0000001900)={[0x7fff]}, 0x8) r9 = signalfd4(r8, &(0x7f0000001940)={[0x7fff]}, 0x8, 0x80000) (async) fdatasync(r5) socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 32) r10 = eventfd(0x5) (rerun: 32) ioctl$EXT4_IOC_GET_ES_CACHE(r10, 0xc020662a, &(0x7f0000001980)={0x7a, 0x7, 0x1, 0xfffffffc, 0x1, [{0xf67, 0x1, 0x9751, '\x00', 0x84}]}) (async) r11 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) fcntl$dupfd(r11, 0x406, r7) connect$inet(r9, &(0x7f0000001a00)={0x2, 0x4e24, @loopback}, 0x10) (async) openat$cgroup_ro(r6, &(0x7f0000001a40)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async) r12 = ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) ioctl$TIOCGPGRP(r12, 0x540f, &(0x7f0000001a80)) (async) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001bc0)={{}, 0x0, 0x8, @inherit={0x90, &(0x7f0000001b00)={0x0, 0x9, 0x9, 0x54, {0x60, 0xfffffffffffff800, 0x1, 0x81, 0xc7}, [0xfffffffffffffffe, 0x6, 0x35, 0x1000, 0x1, 0x8001, 0x2, 0x3f, 0xffffffff7fffffff]}}, @subvolid=0x4}) 16:21:36 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) utime(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x39, 0x7f}) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0x8913, 0x20000000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x802, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000001c0)={0x0, 0xf000000000000000, [0xfffffffffffffffc, 0x8000, 0x3, 0x9, 0x0, 0x5]}) r3 = socket$inet_icmp(0x2, 0x2, 0x1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r3, r4, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$TIOCGPTLCK(r4, 0x541b, &(0x7f0000000040)) r5 = socket$inet_icmp(0x2, 0x2, 0x1) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r5, r6, 0x0) ioctl$TIOCGPTLCK(r6, 0x541b, &(0x7f0000000040)) fallocate(r6, 0x2, 0x100000001, 0x6) r7 = openat$cgroup_subtree(r0, &(0x7f0000000180), 0x2, 0x0) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f00000000c0)=0x1) D0706 16:21:36.601086 711557 usertrap_amd64.go:212] [ 1719(17023): 1719(17023)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:36.601189 711557 usertrap_amd64.go:122] [ 1719(17023): 1719(17023)] Allocate a new trap: 0xc000475740 40 D0706 16:21:36.603698 711557 usertrap_amd64.go:225] [ 1719(17023): 1719(17023)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:36.610353 711557 usertrap_amd64.go:212] [ 1719(17023): 1719(17023)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:36.610430 711557 usertrap_amd64.go:122] [ 1719(17023): 1719(17023)] Allocate a new trap: 0xc000475740 41 D0706 16:21:36.610941 711557 usertrap_amd64.go:225] [ 1719(17023): 1719(17023)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:36.614251 711557 usertrap_amd64.go:212] [ 1711(15769): 1711(15769)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:36.614326 711557 usertrap_amd64.go:122] [ 1711(15769): 1711(15769)] Allocate a new trap: 0xc000475710 44 D0706 16:21:36.614389 711557 usertrap_amd64.go:225] [ 1711(15769): 1711(15769)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:36.617650 711557 usertrap_amd64.go:212] [ 1720(16440): 1720(16440)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:36.617718 711557 usertrap_amd64.go:122] [ 1720(16440): 1720(16440)] Allocate a new trap: 0xc0038ede30 40 D0706 16:21:36.618127 711557 usertrap_amd64.go:212] [ 1721(17919): 1721(17919)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:36.618230 711557 usertrap_amd64.go:122] [ 1721(17919): 1721(17919)] Allocate a new trap: 0xc008510960 40 D0706 16:21:36.618628 711557 usertrap_amd64.go:225] [ 1720(16440): 1720(16440)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:36.619352 711557 usertrap_amd64.go:225] [ 1721(17919): 1721(17919)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:36.622201 711557 usertrap_amd64.go:212] [ 1721(17919): 1721(17919)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:36.622261 711557 usertrap_amd64.go:122] [ 1721(17919): 1721(17919)] Allocate a new trap: 0xc008510960 41 D0706 16:21:36.622333 711557 usertrap_amd64.go:225] [ 1721(17919): 1721(17919)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:36.634299 711557 usertrap_amd64.go:212] [ 1720(16440): 1720(16440)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:36.634379 711557 usertrap_amd64.go:122] [ 1720(16440): 1720(16440)] Allocate a new trap: 0xc0038ede30 41 D0706 16:21:36.634524 711557 usertrap_amd64.go:225] [ 1720(16440): 1720(16440)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:36.634731 711557 usertrap_amd64.go:212] [ 1719(17023): 1719(17023)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:36.634780 711557 usertrap_amd64.go:122] [ 1719(17023): 1719(17023)] Allocate a new trap: 0xc000475740 42 D0706 16:21:36.634844 711557 usertrap_amd64.go:225] [ 1719(17023): 1719(17023)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:36.640454 711557 usertrap_amd64.go:212] [ 1721(17919): 1721(17919)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:36.640516 711557 usertrap_amd64.go:122] [ 1721(17919): 1721(17919)] Allocate a new trap: 0xc008510960 42 D0706 16:21:36.640592 711557 usertrap_amd64.go:225] [ 1721(17919): 1721(17919)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:36.645824 711557 usertrap_amd64.go:212] [ 1719(17023): 1723(17024)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:36.645930 711557 usertrap_amd64.go:122] [ 1719(17023): 1723(17024)] Allocate a new trap: 0xc000475740 43 D0706 16:21:36.646015 711557 usertrap_amd64.go:225] [ 1719(17023): 1723(17024)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:36.659012 711557 usertrap_amd64.go:212] [ 1720(16440): 1720(16440)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:36.659096 711557 usertrap_amd64.go:122] [ 1720(16440): 1720(16440)] Allocate a new trap: 0xc0038ede30 42 D0706 16:21:36.659252 711557 usertrap_amd64.go:225] [ 1720(16440): 1720(16440)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:36.660326 711557 usertrap_amd64.go:212] [ 1719(17023): 1719(17023)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:36.660469 711557 usertrap_amd64.go:122] [ 1719(17023): 1719(17023)] Allocate a new trap: 0xc000475740 44 D0706 16:21:36.660553 711557 usertrap_amd64.go:225] [ 1719(17023): 1719(17023)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:36.664771 711557 task_exit.go:204] [ 1719(17023): 1719(17023)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.665034 711557 task_signals.go:204] [ 1719(17023): 1723(17024)] Signal 1719, PID: 1723, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.665070 711557 task_exit.go:204] [ 1719(17023): 1719(17023)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.665462 711557 task_exit.go:204] [ 1719(17023): 1723(17024)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.673081 711557 task_exit.go:204] [ 1719(17023): 1723(17024)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.673336 711557 task_exit.go:204] [ 1719(17023): 1723(17024)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.673573 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:36.679093 711557 task_exit.go:204] [ 1719(17023): 1719(17023)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:36 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:36.733143 711557 usertrap_amd64.go:212] [ 1720(16440): 1720(16440)] Found the pattern at ip 55bc30e840aa:sysno 230 D0706 16:21:36.733219 711557 usertrap_amd64.go:122] [ 1720(16440): 1720(16440)] Allocate a new trap: 0xc0038ede30 43 D0706 16:21:36.733277 711557 usertrap_amd64.go:225] [ 1720(16440): 1720(16440)] Apply the binary patch addr 55bc30e840aa trap addr 62d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:36.735764 711557 usertrap_amd64.go:212] [ 1729(17025): 1729(17025)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:36.735986 711557 usertrap_amd64.go:122] [ 1729(17025): 1729(17025)] Allocate a new trap: 0xc1e5771b90 40 D0706 16:21:36.736251 711557 usertrap_amd64.go:212] [ 1720(16440): 1720(16440)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:36.736324 711557 usertrap_amd64.go:122] [ 1720(16440): 1720(16440)] Allocate a new trap: 0xc0038ede30 44 D0706 16:21:36.736429 711557 usertrap_amd64.go:225] [ 1720(16440): 1720(16440)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:36.736887 711557 usertrap_amd64.go:225] [ 1729(17025): 1729(17025)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:36.739808 711557 usertrap_amd64.go:212] [ 1729(17025): 1729(17025)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:36.739869 711557 usertrap_amd64.go:122] [ 1729(17025): 1729(17025)] Allocate a new trap: 0xc1e5771b90 41 D0706 16:21:36.739985 711557 usertrap_amd64.go:225] [ 1729(17025): 1729(17025)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:36.742966 711557 task_exit.go:204] [ 1720(16440): 1720(16440)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.743197 711557 task_exit.go:204] [ 1720(16440): 1720(16440)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.743353 711557 task_signals.go:204] [ 1720(16440): 1731(16445)] Signal 1720, PID: 1731, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.743457 711557 task_exit.go:204] [ 1720(16440): 1731(16445)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.743688 711557 task_exit.go:204] [ 1720(16440): 1731(16445)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.743743 711557 task_exit.go:204] [ 1720(16440): 1731(16445)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.743927 711557 task_signals.go:204] [ 1720(16440): 1725(16441)] Signal 1720, PID: 1725, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.744042 711557 task_exit.go:204] [ 1720(16440): 1725(16441)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.744225 711557 task_exit.go:204] [ 1720(16440): 1725(16441)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.744279 711557 task_exit.go:204] [ 1720(16440): 1725(16441)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.744447 711557 task_signals.go:204] [ 1720(16440): 1726(16442)] Signal 1720, PID: 1726, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.744550 711557 task_exit.go:204] [ 1720(16440): 1726(16442)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.744703 711557 task_exit.go:204] [ 1720(16440): 1726(16442)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.744769 711557 task_exit.go:204] [ 1720(16440): 1726(16442)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.744921 711557 task_signals.go:204] [ 1720(16440): 1727(16443)] Signal 1720, PID: 1727, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.745066 711557 task_exit.go:204] [ 1720(16440): 1727(16443)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.745229 711557 task_exit.go:204] [ 1720(16440): 1727(16443)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.745283 711557 task_exit.go:204] [ 1720(16440): 1727(16443)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.745505 711557 task_signals.go:204] [ 1720(16440): 1728(16444)] Signal 1720, PID: 1728, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:36.745589 711557 task_exit.go:204] [ 1720(16440): 1728(16444)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:36.758931 711557 task_exit.go:204] [ 1720(16440): 1728(16444)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:36.759004 711557 task_exit.go:204] [ 1720(16440): 1728(16444)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.759091 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:36.759675 711557 task_exit.go:204] [ 1720(16440): 1720(16440)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:36.809983 711557 usertrap_amd64.go:212] [ 1721(17919): 1733(17923)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:36.810064 711557 usertrap_amd64.go:122] [ 1721(17919): 1733(17923)] Allocate a new trap: 0xc008510960 43 D0706 16:21:36.810186 711557 usertrap_amd64.go:225] [ 1721(17919): 1733(17923)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:36.884687 711557 usertrap_amd64.go:212] [ 1721(17919): 1721(17919)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:36.884761 711557 usertrap_amd64.go:122] [ 1721(17919): 1721(17919)] Allocate a new trap: 0xc008510960 44 D0706 16:21:36.884870 711557 usertrap_amd64.go:225] [ 1721(17919): 1721(17919)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:37.039752 711557 usertrap_amd64.go:212] [ 1721(17919): 1721(17919)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:37.039842 711557 usertrap_amd64.go:122] [ 1721(17919): 1721(17919)] Allocate a new trap: 0xc008510960 45 D0706 16:21:37.039931 711557 usertrap_amd64.go:225] [ 1721(17919): 1721(17919)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:37.045798 711557 task_exit.go:204] [ 1721(17919): 1721(17919)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.045944 711557 task_signals.go:204] [ 1721(17919): 1724(17920)] Signal 1721, PID: 1724, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.045966 711557 task_signals.go:204] [ 1721(17919): 1734(17924)] Signal 1721, PID: 1734, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.046029 711557 task_signals.go:204] [ 1721(17919): 1730(17921)] Signal 1721, PID: 1730, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.046187 711557 task_exit.go:204] [ 1721(17919): 1730(17921)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.046273 711557 task_exit.go:204] [ 1721(17919): 1724(17920)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.046426 711557 task_signals.go:204] [ 1721(17919): 1732(17922)] Signal 1721, PID: 1732, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.046460 711557 task_signals.go:204] [ 1721(17919): 1733(17923)] Signal 1721, PID: 1733, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.046527 711557 task_exit.go:204] [ 1721(17919): 1724(17920)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.046600 711557 task_exit.go:204] [ 1721(17919): 1724(17920)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.046811 711557 task_exit.go:204] [ 1721(17919): 1732(17922)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.047303 711557 task_exit.go:204] [ 1721(17919): 1734(17924)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.047588 711557 task_exit.go:204] [ 1721(17919): 1734(17924)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.047645 711557 task_exit.go:204] [ 1721(17919): 1734(17924)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.047828 711557 task_exit.go:204] [ 1721(17919): 1733(17923)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.048090 711557 task_exit.go:204] [ 1721(17919): 1732(17922)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.048152 711557 task_exit.go:204] [ 1721(17919): 1732(17922)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.048370 711557 task_exit.go:204] [ 1721(17919): 1730(17921)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.048432 711557 task_exit.go:204] [ 1721(17919): 1730(17921)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.048625 711557 task_exit.go:204] [ 1721(17919): 1721(17919)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.061033 711557 usertrap_amd64.go:212] [ 1729(17025): 1729(17025)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:37.061156 711557 usertrap_amd64.go:122] [ 1729(17025): 1729(17025)] Allocate a new trap: 0xc1e5771b90 42 D0706 16:21:37.061257 711557 usertrap_amd64.go:225] [ 1729(17025): 1729(17025)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:37.066152 711557 task_exit.go:204] [ 1721(17919): 1733(17923)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.066223 711557 task_exit.go:204] [ 1721(17919): 1733(17923)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.066333 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:37.066429 711557 task_exit.go:204] [ 1721(17919): 1721(17919)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.144751 711557 usertrap_amd64.go:212] [ 1729(17025): 1735(17026)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:37.144877 711557 usertrap_amd64.go:122] [ 1729(17025): 1735(17026)] Allocate a new trap: 0xc1e5771b90 43 D0706 16:21:37.145072 711557 usertrap_amd64.go:225] [ 1729(17025): 1735(17026)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:37.161134 711557 usertrap_amd64.go:212] [ 1729(17025): 1729(17025)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:37.161209 711557 usertrap_amd64.go:122] [ 1729(17025): 1729(17025)] Allocate a new trap: 0xc1e5771b90 44 D0706 16:21:37.161331 711557 usertrap_amd64.go:225] [ 1729(17025): 1729(17025)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:37.162603 711557 task_exit.go:204] [ 1729(17025): 1729(17025)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.162757 711557 task_signals.go:204] [ 1729(17025): 1735(17026)] Signal 1729, PID: 1735, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.163030 711557 task_exit.go:204] [ 1729(17025): 1729(17025)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.163124 711557 task_exit.go:204] [ 1729(17025): 1735(17026)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.171231 711557 task_exit.go:204] [ 1729(17025): 1735(17026)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.171324 711557 task_exit.go:204] [ 1729(17025): 1735(17026)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.171421 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:37.171775 711557 task_exit.go:204] [ 1729(17025): 1729(17025)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.346111 711557 usertrap_amd64.go:212] [ 1711(15769): 1711(15769)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:37.346234 711557 usertrap_amd64.go:122] [ 1711(15769): 1711(15769)] Allocate a new trap: 0xc000475710 45 D0706 16:21:37.346309 711557 usertrap_amd64.go:225] [ 1711(15769): 1711(15769)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:37.348495 711557 task_exit.go:204] [ 1711(15769): 1711(15769)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.348629 711557 task_signals.go:204] [ 1711(15769): 1715(15770)] Signal 1711, PID: 1715, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.348632 711557 task_signals.go:204] [ 1711(15769): 1722(15771)] Signal 1711, PID: 1722, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.348700 711557 task_exit.go:204] [ 1711(15769): 1715(15770)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.349109 711557 task_exit.go:204] [ 1711(15769): 1722(15771)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.349578 711557 task_exit.go:204] [ 1711(15769): 1715(15770)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.349647 711557 task_exit.go:204] [ 1711(15769): 1715(15770)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.349828 711557 task_exit.go:204] [ 1711(15769): 1711(15769)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.357430 711557 task_exit.go:204] [ 1711(15769): 1722(15771)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.357528 711557 task_exit.go:204] [ 1711(15769): 1722(15771)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.357610 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:37.358031 711557 task_exit.go:204] [ 1711(15769): 1711(15769)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:37 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:37 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x8000, 0x0) fdatasync(r0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/net', 0x602000, 0x40) sendto$inet(r1, &(0x7f0000000080)="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", 0x1000, 0x4040802, &(0x7f0000001080)={0x2, 0x4e24, @private=0xa010102}, 0x10) (async, rerun: 64) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000010c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000001100)=0x1c, 0x800) (rerun: 64) r3 = signalfd(r2, &(0x7f0000001140)={[0x2]}, 0x8) fsetxattr$security_evm(r2, &(0x7f0000001180), &(0x7f00000011c0)=@v1={0x2, "87e34a243c6356e2a513"}, 0xb, 0x0) (async, rerun: 32) close(r0) (async, rerun: 32) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000001200)={0xe93, {{0x2, 0x4e24, @private=0xa010100}}, 0x1, 0x8, [{{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x33}}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @rand_addr=0x64010102}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x490) connect$inet(r1, &(0x7f00000016c0)={0x2, 0x4e23, @loopback}, 0x10) (async) fcntl$notify(r3, 0x402, 0x8000002f) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, &(0x7f0000001700)=0x1000, r4, &(0x7f0000001740)=0x3ff, 0x2, 0x4) (async, rerun: 64) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001780), 0x0, 0x0) (rerun: 64) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000017c0)={0x7fff, 0x81, 0x6, 0x0, 0x0, [{{r0}, 0x7}, {{r4}, 0x200}, {{r5}, 0x7}, {{r1}, 0x7fff}, {{r0}}, {{r1}, 0x5}]}) (async) r6 = signalfd4(r4, &(0x7f00000018c0)={[0x40]}, 0x8, 0x800) (async) r7 = socket$inet_icmp(0x2, 0x2, 0x1) r8 = signalfd(r7, &(0x7f0000001900)={[0x7fff]}, 0x8) r9 = signalfd4(r8, &(0x7f0000001940)={[0x7fff]}, 0x8, 0x80000) (async) fdatasync(r5) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r10 = eventfd(0x5) ioctl$EXT4_IOC_GET_ES_CACHE(r10, 0xc020662a, &(0x7f0000001980)={0x7a, 0x7, 0x1, 0xfffffffc, 0x1, [{0xf67, 0x1, 0x9751, '\x00', 0x84}]}) (async) r11 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) fcntl$dupfd(r11, 0x406, r7) (async) connect$inet(r9, &(0x7f0000001a00)={0x2, 0x4e24, @loopback}, 0x10) (async, rerun: 64) openat$cgroup_ro(r6, &(0x7f0000001a40)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (rerun: 64) r12 = ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) ioctl$TIOCGPGRP(r12, 0x540f, &(0x7f0000001a80)) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001bc0)={{}, 0x0, 0x8, @inherit={0x90, &(0x7f0000001b00)={0x0, 0x9, 0x9, 0x54, {0x60, 0xfffffffffffff800, 0x1, 0x81, 0xc7}, [0xfffffffffffffffe, 0x6, 0x35, 0x1000, 0x1, 0x8001, 0x2, 0x3f, 0xffffffff7fffffff]}}, @subvolid=0x4}) 16:21:37 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) utime(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x39, 0x7f}) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0x8913, 0x20000000) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x802, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000001c0)={0x0, 0xf000000000000000, [0xfffffffffffffffc, 0x8000, 0x3, 0x9, 0x0, 0x5]}) (async) r3 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r3, r4, 0x0) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) (async) ioctl$TIOCGPTLCK(r4, 0x541b, &(0x7f0000000040)) r5 = socket$inet_icmp(0x2, 0x2, 0x1) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r5, r6, 0x0) ioctl$TIOCGPTLCK(r6, 0x541b, &(0x7f0000000040)) (async) fallocate(r6, 0x2, 0x100000001, 0x6) (async) r7 = openat$cgroup_subtree(r0, &(0x7f0000000180), 0x2, 0x0) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f00000000c0)=0x1) 16:21:37 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:37.386910 711557 usertrap_amd64.go:212] [ 1736(17027): 1736(17027)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:37.387107 711557 usertrap_amd64.go:122] [ 1736(17027): 1736(17027)] Allocate a new trap: 0xc00c6d25d0 40 D0706 16:21:37.391859 711557 usertrap_amd64.go:212] [ 1737(16446): 1737(16446)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:37.392014 711557 usertrap_amd64.go:122] [ 1737(16446): 1737(16446)] Allocate a new trap: 0xc1735996b0 40 D0706 16:21:37.392918 711557 usertrap_amd64.go:225] [ 1737(16446): 1737(16446)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:37.399837 711557 usertrap_amd64.go:212] [ 1737(16446): 1737(16446)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:37.399933 711557 usertrap_amd64.go:122] [ 1737(16446): 1737(16446)] Allocate a new trap: 0xc1735996b0 41 D0706 16:21:37.400077 711557 usertrap_amd64.go:225] [ 1737(16446): 1737(16446)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:37.400564 711557 usertrap_amd64.go:212] [ 1739(15772): 1739(15772)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:37.400676 711557 usertrap_amd64.go:122] [ 1739(15772): 1739(15772)] Allocate a new trap: 0xc017060570 40 D0706 16:21:37.401649 711557 usertrap_amd64.go:225] [ 1736(17027): 1736(17027)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:37.401755 711557 usertrap_amd64.go:225] [ 1739(15772): 1739(15772)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:37.403753 711557 usertrap_amd64.go:212] [ 1738(17925): 1738(17925)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:37.403873 711557 usertrap_amd64.go:122] [ 1738(17925): 1738(17925)] Allocate a new trap: 0xc008918f30 40 D0706 16:21:37.404779 711557 usertrap_amd64.go:225] [ 1738(17925): 1738(17925)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:37.405765 711557 usertrap_amd64.go:212] [ 1736(17027): 1736(17027)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:37.405889 711557 usertrap_amd64.go:122] [ 1736(17027): 1736(17027)] Allocate a new trap: 0xc00c6d25d0 41 D0706 16:21:37.406051 711557 usertrap_amd64.go:225] [ 1736(17027): 1736(17027)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:37.409068 711557 usertrap_amd64.go:212] [ 1738(17925): 1738(17925)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:37.409267 711557 usertrap_amd64.go:122] [ 1738(17925): 1738(17925)] Allocate a new trap: 0xc008918f30 41 D0706 16:21:37.409403 711557 usertrap_amd64.go:225] [ 1738(17925): 1738(17925)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:37.411917 711557 usertrap_amd64.go:212] [ 1739(15772): 1739(15772)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:37.411990 711557 usertrap_amd64.go:122] [ 1739(15772): 1739(15772)] Allocate a new trap: 0xc017060570 41 D0706 16:21:37.412096 711557 usertrap_amd64.go:225] [ 1739(15772): 1739(15772)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:37.425300 711557 usertrap_amd64.go:212] [ 1737(16446): 1737(16446)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:37.425445 711557 usertrap_amd64.go:122] [ 1737(16446): 1737(16446)] Allocate a new trap: 0xc1735996b0 42 D0706 16:21:37.425645 711557 usertrap_amd64.go:225] [ 1737(16446): 1737(16446)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:37.433871 711557 usertrap_amd64.go:212] [ 1736(17027): 1736(17027)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:37.433961 711557 usertrap_amd64.go:122] [ 1736(17027): 1736(17027)] Allocate a new trap: 0xc00c6d25d0 42 D0706 16:21:37.434016 711557 usertrap_amd64.go:225] [ 1736(17027): 1736(17027)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:37.444443 711557 usertrap_amd64.go:212] [ 1738(17925): 1738(17925)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:37.444509 711557 usertrap_amd64.go:212] [ 1736(17027): 1742(17028)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:37.444566 711557 usertrap_amd64.go:122] [ 1738(17925): 1738(17925)] Allocate a new trap: 0xc008918f30 42 D0706 16:21:37.444588 711557 usertrap_amd64.go:122] [ 1736(17027): 1742(17028)] Allocate a new trap: 0xc00c6d25d0 43 D0706 16:21:37.444634 711557 usertrap_amd64.go:225] [ 1738(17925): 1738(17925)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:37.444666 711557 usertrap_amd64.go:225] [ 1736(17027): 1742(17028)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:37.446637 711557 usertrap_amd64.go:212] [ 1739(15772): 1739(15772)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:37.446726 711557 usertrap_amd64.go:122] [ 1739(15772): 1739(15772)] Allocate a new trap: 0xc017060570 42 D0706 16:21:37.446838 711557 usertrap_amd64.go:225] [ 1739(15772): 1739(15772)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:37.460397 711557 usertrap_amd64.go:212] [ 1739(15772): 1745(15773)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:37.460514 711557 usertrap_amd64.go:122] [ 1739(15772): 1745(15773)] Allocate a new trap: 0xc017060570 43 D0706 16:21:37.460593 711557 usertrap_amd64.go:225] [ 1739(15772): 1745(15773)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:37.469288 711557 usertrap_amd64.go:212] [ 1738(17925): 1746(17927)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:37.469384 711557 usertrap_amd64.go:122] [ 1738(17925): 1746(17927)] Allocate a new trap: 0xc008918f30 43 D0706 16:21:37.469457 711557 usertrap_amd64.go:225] [ 1738(17925): 1746(17927)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:37.482559 711557 usertrap_amd64.go:212] [ 1737(16446): 1737(16446)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:37.482616 711557 usertrap_amd64.go:122] [ 1737(16446): 1737(16446)] Allocate a new trap: 0xc1735996b0 43 D0706 16:21:37.482731 711557 usertrap_amd64.go:225] [ 1737(16446): 1737(16446)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:37.491244 711557 task_exit.go:204] [ 1737(16446): 1737(16446)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.491510 711557 task_exit.go:204] [ 1737(16446): 1737(16446)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.491697 711557 task_signals.go:204] [ 1737(16446): 1740(16447)] Signal 1737, PID: 1740, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.491841 711557 task_signals.go:204] [ 1737(16446): 1750(16450)] Signal 1737, PID: 1750, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.492019 711557 task_exit.go:204] [ 1737(16446): 1750(16450)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.492144 711557 task_signals.go:204] [ 1737(16446): 1743(16449)] Signal 1737, PID: 1743, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.492195 711557 task_signals.go:204] [ 1737(16446): 1741(16448)] Signal 1737, PID: 1741, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.492228 711557 task_exit.go:204] [ 1737(16446): 1743(16449)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.492297 711557 task_exit.go:204] [ 1737(16446): 1741(16448)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.492714 711557 task_exit.go:204] [ 1737(16446): 1750(16450)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.492770 711557 task_exit.go:204] [ 1737(16446): 1750(16450)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.492876 711557 task_exit.go:204] [ 1737(16446): 1740(16447)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.493162 711557 task_exit.go:204] [ 1737(16446): 1740(16447)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.493252 711557 task_exit.go:204] [ 1737(16446): 1740(16447)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.494253 711557 task_exit.go:204] [ 1737(16446): 1741(16448)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.494358 711557 task_exit.go:204] [ 1737(16446): 1741(16448)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.505059 711557 task_exit.go:204] [ 1737(16446): 1743(16449)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.505139 711557 task_exit.go:204] [ 1737(16446): 1743(16449)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.505231 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:37.505692 711557 task_exit.go:204] [ 1737(16446): 1737(16446)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:37 executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = eventfd2(0x0, 0x0) dup3(r0, r1, 0x0) r2 = epoll_create1(0x0) dup3(r1, r2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x40) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) D0706 16:21:37.517273 711557 usertrap_amd64.go:212] [ 1736(17027): 1736(17027)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:37.517373 711557 usertrap_amd64.go:122] [ 1736(17027): 1736(17027)] Allocate a new trap: 0xc00c6d25d0 44 D0706 16:21:37.517441 711557 usertrap_amd64.go:225] [ 1736(17027): 1736(17027)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:37.535387 711557 usertrap_amd64.go:212] [ 1738(17925): 1738(17925)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:37.535489 711557 usertrap_amd64.go:122] [ 1738(17925): 1738(17925)] Allocate a new trap: 0xc008918f30 44 D0706 16:21:37.535586 711557 usertrap_amd64.go:225] [ 1738(17925): 1738(17925)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:37.549446 711557 usertrap_amd64.go:212] [ 1739(15772): 1739(15772)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:37.549530 711557 usertrap_amd64.go:122] [ 1739(15772): 1739(15772)] Allocate a new trap: 0xc017060570 44 D0706 16:21:37.549611 711557 usertrap_amd64.go:225] [ 1739(15772): 1739(15772)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:37.891962 711557 usertrap_amd64.go:212] [ 1736(17027): 1736(17027)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:37.892058 711557 usertrap_amd64.go:122] [ 1736(17027): 1736(17027)] Allocate a new trap: 0xc00c6d25d0 45 D0706 16:21:37.892123 711557 usertrap_amd64.go:225] [ 1736(17027): 1736(17027)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:37.893497 711557 usertrap_amd64.go:212] [ 1738(17925): 1738(17925)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:37.893574 711557 usertrap_amd64.go:122] [ 1738(17925): 1738(17925)] Allocate a new trap: 0xc008918f30 45 D0706 16:21:37.893684 711557 usertrap_amd64.go:225] [ 1738(17925): 1738(17925)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:37.896786 711557 task_exit.go:204] [ 1736(17027): 1736(17027)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.897111 711557 task_exit.go:204] [ 1736(17027): 1736(17027)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.897276 711557 task_signals.go:204] [ 1736(17027): 1742(17028)] Signal 1736, PID: 1742, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.897363 711557 task_exit.go:204] [ 1736(17027): 1742(17028)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.898956 711557 task_exit.go:204] [ 1738(17925): 1738(17925)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.899368 711557 task_signals.go:204] [ 1738(17925): 1744(17926)] Signal 1738, PID: 1744, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.899412 711557 task_signals.go:204] [ 1738(17925): 1749(17930)] Signal 1738, PID: 1749, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.899589 711557 task_exit.go:204] [ 1738(17925): 1738(17925)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.899802 711557 task_signals.go:204] [ 1738(17925): 1747(17928)] Signal 1738, PID: 1747, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.899961 711557 task_signals.go:204] [ 1738(17925): 1746(17927)] Signal 1738, PID: 1746, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.899978 711557 task_exit.go:204] [ 1738(17925): 1744(17926)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.900172 711557 task_signals.go:204] [ 1738(17925): 1748(17929)] Signal 1738, PID: 1748, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:37.900201 711557 task_exit.go:204] [ 1738(17925): 1746(17927)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.900438 711557 task_exit.go:204] [ 1738(17925): 1746(17927)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.900512 711557 task_exit.go:204] [ 1738(17925): 1746(17927)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.900669 711557 task_exit.go:204] [ 1738(17925): 1748(17929)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.900895 711557 task_exit.go:204] [ 1738(17925): 1748(17929)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.900987 711557 task_exit.go:204] [ 1738(17925): 1748(17929)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.901077 711557 task_exit.go:204] [ 1738(17925): 1747(17928)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.901281 711557 task_exit.go:204] [ 1738(17925): 1749(17930)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:37.901421 711557 task_exit.go:204] [ 1738(17925): 1744(17926)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.901483 711557 task_exit.go:204] [ 1738(17925): 1744(17926)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.901868 711557 task_exit.go:204] [ 1738(17925): 1749(17930)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.901939 711557 task_exit.go:204] [ 1738(17925): 1749(17930)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.908145 711557 task_exit.go:204] [ 1736(17027): 1742(17028)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.908248 711557 task_exit.go:204] [ 1736(17027): 1742(17028)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.908345 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:37.909134 711557 task_exit.go:204] [ 1736(17027): 1736(17027)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:37 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:37.914114 711557 task_exit.go:204] [ 1738(17925): 1747(17928)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:37.914210 711557 task_exit.go:204] [ 1738(17925): 1747(17928)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:37.914301 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:37.915174 711557 task_exit.go:204] [ 1738(17925): 1738(17925)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:37 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) utime(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x39, 0x7f}) (async, rerun: 64) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async, rerun: 64) fallocate(r0, 0x0, 0x0, 0x21d42a8a) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0x8913, 0x20000000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x802, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000001c0)={0x0, 0xf000000000000000, [0xfffffffffffffffc, 0x8000, 0x3, 0x9, 0x0, 0x5]}) r3 = socket$inet_icmp(0x2, 0x2, 0x1) (async) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r3, r4, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$TIOCGPTLCK(r4, 0x541b, &(0x7f0000000040)) r5 = socket$inet_icmp(0x2, 0x2, 0x1) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') dup3(r5, r6, 0x0) (async) ioctl$TIOCGPTLCK(r6, 0x541b, &(0x7f0000000040)) fallocate(r6, 0x2, 0x100000001, 0x6) (async) r7 = openat$cgroup_subtree(r0, &(0x7f0000000180), 0x2, 0x0) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f00000000c0)=0x1) D0706 16:21:38.019876 711557 usertrap_amd64.go:212] [ 1752(16451): 1752(16451)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:38.020090 711557 usertrap_amd64.go:122] [ 1752(16451): 1752(16451)] Allocate a new trap: 0xc0085109f0 40 D0706 16:21:38.023272 711557 usertrap_amd64.go:225] [ 1752(16451): 1752(16451)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:38.026219 711557 usertrap_amd64.go:212] [ 1752(16451): 1752(16451)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:38.026301 711557 usertrap_amd64.go:122] [ 1752(16451): 1752(16451)] Allocate a new trap: 0xc0085109f0 41 D0706 16:21:38.026418 711557 usertrap_amd64.go:225] [ 1752(16451): 1752(16451)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:38.046203 711557 usertrap_amd64.go:212] [ 1754(17931): 1754(17931)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:38.046554 711557 usertrap_amd64.go:122] [ 1754(17931): 1754(17931)] Allocate a new trap: 0xc015168060 40 D0706 16:21:38.048225 711557 usertrap_amd64.go:225] [ 1754(17931): 1754(17931)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:38.051095 711557 usertrap_amd64.go:212] [ 1753(17029): 1753(17029)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:38.051181 711557 usertrap_amd64.go:122] [ 1753(17029): 1753(17029)] Allocate a new trap: 0xc015168030 40 D0706 16:21:38.052120 711557 usertrap_amd64.go:225] [ 1753(17029): 1753(17029)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:38.055868 711557 usertrap_amd64.go:212] [ 1754(17931): 1754(17931)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:38.055972 711557 usertrap_amd64.go:122] [ 1754(17931): 1754(17931)] Allocate a new trap: 0xc015168060 41 D0706 16:21:38.056055 711557 usertrap_amd64.go:225] [ 1754(17931): 1754(17931)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:38.060242 711557 usertrap_amd64.go:212] [ 1753(17029): 1753(17029)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:38.060303 711557 usertrap_amd64.go:122] [ 1753(17029): 1753(17029)] Allocate a new trap: 0xc015168030 41 D0706 16:21:38.060364 711557 usertrap_amd64.go:225] [ 1753(17029): 1753(17029)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:38.061708 711557 usertrap_amd64.go:212] [ 1752(16451): 1752(16451)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:38.061787 711557 usertrap_amd64.go:122] [ 1752(16451): 1752(16451)] Allocate a new trap: 0xc0085109f0 42 D0706 16:21:38.062673 711557 usertrap_amd64.go:225] [ 1752(16451): 1752(16451)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:38.100636 711557 usertrap_amd64.go:212] [ 1752(16451): 1752(16451)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:38.100743 711557 usertrap_amd64.go:122] [ 1752(16451): 1752(16451)] Allocate a new trap: 0xc0085109f0 43 D0706 16:21:38.101247 711557 usertrap_amd64.go:225] [ 1752(16451): 1752(16451)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:38.106056 711557 usertrap_amd64.go:212] [ 1754(17931): 1754(17931)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:38.106133 711557 usertrap_amd64.go:122] [ 1754(17931): 1754(17931)] Allocate a new trap: 0xc015168060 42 D0706 16:21:38.106242 711557 usertrap_amd64.go:225] [ 1754(17931): 1754(17931)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:38.107370 711557 usertrap_amd64.go:212] [ 1753(17029): 1753(17029)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:38.107469 711557 usertrap_amd64.go:122] [ 1753(17029): 1753(17029)] Allocate a new trap: 0xc015168030 42 D0706 16:21:38.107540 711557 usertrap_amd64.go:225] [ 1753(17029): 1753(17029)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:38.116671 711557 task_exit.go:204] [ 1752(16451): 1752(16451)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.117013 711557 task_exit.go:204] [ 1752(16451): 1752(16451)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.117123 711557 task_signals.go:204] [ 1752(16451): 1755(16452)] Signal 1752, PID: 1755, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.117612 711557 task_exit.go:204] [ 1752(16451): 1755(16452)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.117781 711557 usertrap_amd64.go:212] [ 1753(17029): 1757(17030)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:38.117846 711557 usertrap_amd64.go:122] [ 1753(17029): 1757(17030)] Allocate a new trap: 0xc015168030 43 D0706 16:21:38.117993 711557 usertrap_amd64.go:225] [ 1753(17029): 1757(17030)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:38.125940 711557 task_exit.go:204] [ 1752(16451): 1755(16452)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.126218 711557 task_exit.go:204] [ 1752(16451): 1755(16452)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.126387 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:38.126492 711557 task_exit.go:204] [ 1752(16451): 1752(16451)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:38 executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = eventfd2(0x0, 0x0) dup3(r0, r1, 0x0) (async) r2 = epoll_create1(0x0) dup3(r1, r2, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x40) (async) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) D0706 16:21:38.129007 711557 usertrap_amd64.go:212] [ 1754(17931): 1762(17937)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:38.129090 711557 usertrap_amd64.go:122] [ 1754(17931): 1762(17937)] Allocate a new trap: 0xc015168060 43 D0706 16:21:38.129274 711557 usertrap_amd64.go:225] [ 1754(17931): 1762(17937)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:38.604000 711557 usertrap_amd64.go:212] [ 1754(17931): 1754(17931)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:38.604089 711557 usertrap_amd64.go:122] [ 1754(17931): 1754(17931)] Allocate a new trap: 0xc015168060 44 D0706 16:21:38.604179 711557 usertrap_amd64.go:225] [ 1754(17931): 1754(17931)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:38.605327 711557 usertrap_amd64.go:212] [ 1753(17029): 1753(17029)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:38.605422 711557 usertrap_amd64.go:122] [ 1753(17029): 1753(17029)] Allocate a new trap: 0xc015168030 44 D0706 16:21:38.605424 711557 usertrap_amd64.go:212] [ 1739(15772): 1739(15772)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:38.605563 711557 usertrap_amd64.go:122] [ 1739(15772): 1739(15772)] Allocate a new trap: 0xc017060570 45 D0706 16:21:38.605569 711557 usertrap_amd64.go:225] [ 1753(17029): 1753(17029)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:38.605675 711557 usertrap_amd64.go:225] [ 1739(15772): 1739(15772)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:38.609246 711557 usertrap_amd64.go:212] [ 1753(17029): 1753(17029)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:38.609337 711557 usertrap_amd64.go:122] [ 1753(17029): 1753(17029)] Allocate a new trap: 0xc015168030 45 D0706 16:21:38.609414 711557 usertrap_amd64.go:225] [ 1753(17029): 1753(17029)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:38.619177 711557 task_exit.go:204] [ 1753(17029): 1753(17029)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.619791 711557 task_signals.go:204] [ 1753(17029): 1757(17030)] Signal 1753, PID: 1757, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.620013 711557 task_exit.go:204] [ 1753(17029): 1757(17030)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.620302 711557 usertrap_amd64.go:212] [ 1754(17931): 1754(17931)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:38.620394 711557 task_exit.go:204] [ 1753(17029): 1757(17030)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.620438 711557 usertrap_amd64.go:122] [ 1754(17931): 1754(17931)] Allocate a new trap: 0xc015168060 45 D0706 16:21:38.620609 711557 usertrap_amd64.go:225] [ 1754(17931): 1754(17931)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:38.620463 711557 task_exit.go:204] [ 1753(17029): 1757(17030)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.621282 711557 task_exit.go:204] [ 1739(15772): 1739(15772)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.621515 711557 task_signals.go:204] [ 1739(15772): 1745(15773)] Signal 1739, PID: 1745, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.621561 711557 task_exit.go:204] [ 1739(15772): 1739(15772)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.621787 711557 task_exit.go:204] [ 1739(15772): 1745(15773)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.622057 711557 task_exit.go:204] [ 1739(15772): 1745(15773)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.622147 711557 task_exit.go:204] [ 1739(15772): 1745(15773)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.622327 711557 task_signals.go:204] [ 1739(15772): 1751(15774)] Signal 1739, PID: 1751, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.622435 711557 task_exit.go:204] [ 1739(15772): 1751(15774)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.626207 711557 task_exit.go:204] [ 1754(17931): 1754(17931)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.626481 711557 task_exit.go:204] [ 1754(17931): 1754(17931)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.626607 711557 task_signals.go:204] [ 1754(17931): 1758(17933)] Signal 1754, PID: 1758, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.626667 711557 task_exit.go:204] [ 1754(17931): 1758(17933)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.627173 711557 task_signals.go:204] [ 1754(17931): 1760(17935)] Signal 1754, PID: 1760, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.627159 711557 task_signals.go:204] [ 1754(17931): 1761(17936)] Signal 1754, PID: 1761, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.627308 711557 task_exit.go:204] [ 1754(17931): 1761(17936)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.627396 711557 task_signals.go:204] [ 1754(17931): 1759(17934)] Signal 1754, PID: 1759, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.627455 711557 task_signals.go:204] [ 1754(17931): 1756(17932)] Signal 1754, PID: 1756, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.627653 711557 task_signals.go:204] [ 1754(17931): 1762(17937)] Signal 1754, PID: 1762, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.627733 711557 task_exit.go:204] [ 1754(17931): 1761(17936)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.627782 711557 task_exit.go:204] [ 1754(17931): 1761(17936)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.627907 711557 task_exit.go:204] [ 1754(17931): 1758(17933)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.627957 711557 task_exit.go:204] [ 1754(17931): 1758(17933)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.628025 711557 task_exit.go:204] [ 1754(17931): 1760(17935)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.628230 711557 task_exit.go:204] [ 1754(17931): 1760(17935)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.628306 711557 task_exit.go:204] [ 1754(17931): 1760(17935)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.628417 711557 task_exit.go:204] [ 1754(17931): 1759(17934)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.628507 711557 task_exit.go:204] [ 1754(17931): 1756(17932)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.628799 711557 task_exit.go:204] [ 1754(17931): 1756(17932)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.628846 711557 task_exit.go:204] [ 1754(17931): 1756(17932)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.629018 711557 task_exit.go:204] [ 1754(17931): 1762(17937)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.629182 711557 task_exit.go:204] [ 1754(17931): 1759(17934)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.629253 711557 task_exit.go:204] [ 1754(17931): 1759(17934)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.632103 711557 task_exit.go:204] [ 1753(17029): 1753(17029)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.632210 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:38.632804 711557 task_exit.go:204] [ 1753(17029): 1753(17029)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.641337 711557 task_exit.go:204] [ 1754(17931): 1762(17937)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.641498 711557 task_exit.go:204] [ 1754(17931): 1762(17937)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.641601 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:38.642648 711557 task_exit.go:204] [ 1754(17931): 1754(17931)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.648789 711557 task_exit.go:204] [ 1739(15772): 1751(15774)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.648892 711557 task_exit.go:204] [ 1739(15772): 1751(15774)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.649055 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:38.650492 711557 task_exit.go:204] [ 1739(15772): 1739(15772)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:38 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:38 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:38 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket(0xb, 0x800, 0x6) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f00000000c0)={0x1, 0x4}) D0706 16:21:38.748210 711557 usertrap_amd64.go:212] [ 1763(16453): 1763(16453)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:38.748317 711557 usertrap_amd64.go:122] [ 1763(16453): 1763(16453)] Allocate a new trap: 0xc1e5771c50 40 D0706 16:21:38.750220 711557 usertrap_amd64.go:225] [ 1763(16453): 1763(16453)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:38.765784 711557 usertrap_amd64.go:212] [ 1763(16453): 1763(16453)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:38.765932 711557 usertrap_amd64.go:122] [ 1763(16453): 1763(16453)] Allocate a new trap: 0xc1e5771c50 41 D0706 16:21:38.766049 711557 usertrap_amd64.go:225] [ 1763(16453): 1763(16453)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:38.767131 711557 usertrap_amd64.go:212] [ 1764(17938): 1764(17938)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:38.767225 711557 usertrap_amd64.go:122] [ 1764(17938): 1764(17938)] Allocate a new trap: 0xc00b3fa330 40 D0706 16:21:38.768566 711557 usertrap_amd64.go:225] [ 1764(17938): 1764(17938)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:38.769313 711557 usertrap_amd64.go:212] [ 1765(17031): 1765(17031)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:38.769425 711557 usertrap_amd64.go:122] [ 1765(17031): 1765(17031)] Allocate a new trap: 0xc008918fc0 40 D0706 16:21:38.770362 711557 usertrap_amd64.go:225] [ 1765(17031): 1765(17031)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:38.772397 711557 usertrap_amd64.go:212] [ 1764(17938): 1764(17938)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:38.772463 711557 usertrap_amd64.go:122] [ 1764(17938): 1764(17938)] Allocate a new trap: 0xc00b3fa330 41 D0706 16:21:38.772578 711557 usertrap_amd64.go:225] [ 1764(17938): 1764(17938)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:38.782032 711557 usertrap_amd64.go:212] [ 1765(17031): 1765(17031)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:38.782212 711557 usertrap_amd64.go:122] [ 1765(17031): 1765(17031)] Allocate a new trap: 0xc008918fc0 41 D0706 16:21:38.782373 711557 usertrap_amd64.go:225] [ 1765(17031): 1765(17031)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:38.788872 711557 usertrap_amd64.go:212] [ 1763(16453): 1763(16453)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:38.789014 711557 usertrap_amd64.go:122] [ 1763(16453): 1763(16453)] Allocate a new trap: 0xc1e5771c50 42 D0706 16:21:38.789115 711557 usertrap_amd64.go:225] [ 1763(16453): 1763(16453)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:38.790840 711557 usertrap_amd64.go:212] [ 1766(15775): 1766(15775)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:38.790930 711557 usertrap_amd64.go:122] [ 1766(15775): 1766(15775)] Allocate a new trap: 0xc017060690 40 D0706 16:21:38.791996 711557 usertrap_amd64.go:225] [ 1766(15775): 1766(15775)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:38.799613 711557 usertrap_amd64.go:212] [ 1766(15775): 1766(15775)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:38.799713 711557 usertrap_amd64.go:122] [ 1766(15775): 1766(15775)] Allocate a new trap: 0xc017060690 41 D0706 16:21:38.799808 711557 usertrap_amd64.go:225] [ 1766(15775): 1766(15775)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:38.803734 711557 usertrap_amd64.go:212] [ 1764(17938): 1764(17938)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:38.803816 711557 usertrap_amd64.go:122] [ 1764(17938): 1764(17938)] Allocate a new trap: 0xc00b3fa330 42 D0706 16:21:38.803954 711557 usertrap_amd64.go:225] [ 1764(17938): 1764(17938)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:38.812874 711557 usertrap_amd64.go:212] [ 1765(17031): 1765(17031)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:38.812977 711557 usertrap_amd64.go:122] [ 1765(17031): 1765(17031)] Allocate a new trap: 0xc008918fc0 42 D0706 16:21:38.813059 711557 usertrap_amd64.go:225] [ 1765(17031): 1765(17031)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:38.823273 711557 usertrap_amd64.go:212] [ 1765(17031): 1770(17032)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:38.823335 711557 usertrap_amd64.go:122] [ 1765(17031): 1770(17032)] Allocate a new trap: 0xc008918fc0 43 D0706 16:21:38.823397 711557 usertrap_amd64.go:225] [ 1765(17031): 1770(17032)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:38.827609 711557 usertrap_amd64.go:212] [ 1766(15775): 1766(15775)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:38.827708 711557 usertrap_amd64.go:122] [ 1766(15775): 1766(15775)] Allocate a new trap: 0xc017060690 42 D0706 16:21:38.827828 711557 usertrap_amd64.go:225] [ 1766(15775): 1766(15775)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:38.833349 711557 usertrap_amd64.go:212] [ 1763(16453): 1763(16453)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:38.833477 711557 usertrap_amd64.go:122] [ 1763(16453): 1763(16453)] Allocate a new trap: 0xc1e5771c50 43 D0706 16:21:38.833557 711557 usertrap_amd64.go:225] [ 1763(16453): 1763(16453)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:38.838126 711557 usertrap_amd64.go:212] [ 1765(17031): 1765(17031)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:38.838220 711557 usertrap_amd64.go:122] [ 1765(17031): 1765(17031)] Allocate a new trap: 0xc008918fc0 44 D0706 16:21:38.838377 711557 usertrap_amd64.go:225] [ 1765(17031): 1765(17031)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:38.849438 711557 usertrap_amd64.go:212] [ 1766(15775): 1771(15776)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:38.849585 711557 usertrap_amd64.go:122] [ 1766(15775): 1771(15776)] Allocate a new trap: 0xc017060690 43 D0706 16:21:38.849701 711557 usertrap_amd64.go:225] [ 1766(15775): 1771(15776)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:38.850951 711557 task_exit.go:204] [ 1765(17031): 1765(17031)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.851230 711557 task_signals.go:204] [ 1765(17031): 1770(17032)] Signal 1765, PID: 1770, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.851712 711557 task_exit.go:204] [ 1765(17031): 1770(17032)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.852133 711557 task_exit.go:204] [ 1765(17031): 1765(17031)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.859902 711557 task_exit.go:204] [ 1763(16453): 1763(16453)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.860087 711557 task_signals.go:204] [ 1763(16453): 1768(16455)] Signal 1763, PID: 1768, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.860143 711557 task_exit.go:204] [ 1763(16453): 1763(16453)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.860205 711557 task_exit.go:204] [ 1763(16453): 1768(16455)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.860503 711557 task_exit.go:204] [ 1763(16453): 1768(16455)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.860542 711557 task_exit.go:204] [ 1763(16453): 1768(16455)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.861099 711557 task_signals.go:204] [ 1763(16453): 1767(16454)] Signal 1763, PID: 1767, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:38.861275 711557 task_exit.go:204] [ 1763(16453): 1767(16454)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:38.861794 711557 task_exit.go:204] [ 1765(17031): 1770(17032)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.861903 711557 task_exit.go:204] [ 1765(17031): 1770(17032)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.862079 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:38.863419 711557 task_exit.go:204] [ 1765(17031): 1765(17031)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:38 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:38.909907 711557 usertrap_amd64.go:212] [ 1773(17033): 1773(17033)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:38.909997 711557 usertrap_amd64.go:122] [ 1773(17033): 1773(17033)] Allocate a new trap: 0xc000475800 40 D0706 16:21:38.910878 711557 usertrap_amd64.go:225] [ 1773(17033): 1773(17033)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:38.921927 711557 usertrap_amd64.go:212] [ 1773(17033): 1773(17033)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:38.922031 711557 usertrap_amd64.go:122] [ 1773(17033): 1773(17033)] Allocate a new trap: 0xc000475800 41 D0706 16:21:38.922149 711557 usertrap_amd64.go:225] [ 1773(17033): 1773(17033)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:38.928477 711557 task_exit.go:204] [ 1763(16453): 1767(16454)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:38.928748 711557 task_exit.go:204] [ 1763(16453): 1767(16454)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:38.928963 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:38.929075 711557 task_exit.go:204] [ 1763(16453): 1763(16453)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:38 executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = eventfd2(0x0, 0x0) dup3(r0, r1, 0x0) r2 = epoll_create1(0x0) dup3(r1, r2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x40) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) D0706 16:21:38.932688 711557 usertrap_amd64.go:212] [ 1766(15775): 1766(15775)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:38.932811 711557 usertrap_amd64.go:122] [ 1766(15775): 1766(15775)] Allocate a new trap: 0xc017060690 44 D0706 16:21:38.932891 711557 usertrap_amd64.go:225] [ 1766(15775): 1766(15775)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:39.009559 711557 usertrap_amd64.go:212] [ 1764(17938): 1764(17938)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:39.009663 711557 usertrap_amd64.go:122] [ 1764(17938): 1764(17938)] Allocate a new trap: 0xc00b3fa330 43 D0706 16:21:39.009741 711557 usertrap_amd64.go:225] [ 1764(17938): 1764(17938)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:39.342816 711557 usertrap_amd64.go:212] [ 1764(17938): 1764(17938)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:39.342911 711557 usertrap_amd64.go:122] [ 1764(17938): 1764(17938)] Allocate a new trap: 0xc00b3fa330 44 D0706 16:21:39.343013 711557 usertrap_amd64.go:225] [ 1764(17938): 1764(17938)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:39.345434 711557 task_signals.go:470] [ 6: 4032] Notified of signal 23 D0706 16:21:39.345594 711557 task_signals.go:220] [ 6: 4032] Signal 23: delivering to handler D0706 16:21:39.351411 711557 task_exit.go:204] [ 1764(17938): 1764(17938)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.351698 711557 task_exit.go:204] [ 1764(17938): 1764(17938)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.351822 711557 task_signals.go:204] [ 1764(17938): 1772(17940)] Signal 1764, PID: 1772, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.351800 711557 task_signals.go:204] [ 1764(17938): 1769(17939)] Signal 1764, PID: 1769, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.352323 711557 task_signals.go:204] [ 1764(17938): 1776(17942)] Signal 1764, PID: 1776, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.352465 711557 task_exit.go:204] [ 1764(17938): 1776(17942)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.352451 711557 task_signals.go:204] [ 1764(17938): 1775(17941)] Signal 1764, PID: 1775, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.352565 711557 task_exit.go:204] [ 1764(17938): 1775(17941)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.352722 711557 task_exit.go:204] [ 1764(17938): 1776(17942)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.352777 711557 task_exit.go:204] [ 1764(17938): 1776(17942)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.352889 711557 task_exit.go:204] [ 1764(17938): 1772(17940)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.353131 711557 task_exit.go:204] [ 1764(17938): 1772(17940)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.355296 711557 task_exit.go:204] [ 1764(17938): 1772(17940)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.355470 711557 task_exit.go:204] [ 1764(17938): 1769(17939)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.356423 711557 usertrap_amd64.go:212] [ 1773(17033): 1773(17033)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:39.356593 711557 usertrap_amd64.go:122] [ 1773(17033): 1773(17033)] Allocate a new trap: 0xc000475800 42 D0706 16:21:39.356709 711557 task_exit.go:204] [ 1764(17938): 1775(17941)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.356752 711557 usertrap_amd64.go:225] [ 1773(17033): 1773(17033)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:39.356780 711557 task_exit.go:204] [ 1764(17938): 1775(17941)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.364748 711557 usertrap_amd64.go:212] [ 1773(17033): 1777(17034)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:39.364862 711557 usertrap_amd64.go:122] [ 1773(17033): 1777(17034)] Allocate a new trap: 0xc000475800 43 D0706 16:21:39.364983 711557 usertrap_amd64.go:225] [ 1773(17033): 1777(17034)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:39.371042 711557 usertrap_amd64.go:212] [ 1778(16456): 1778(16456)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:39.371150 711557 usertrap_amd64.go:122] [ 1778(16456): 1778(16456)] Allocate a new trap: 0xc008919050 40 D0706 16:21:39.371865 711557 usertrap_amd64.go:225] [ 1778(16456): 1778(16456)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:39.378433 711557 usertrap_amd64.go:212] [ 1778(16456): 1778(16456)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:39.378534 711557 usertrap_amd64.go:122] [ 1778(16456): 1778(16456)] Allocate a new trap: 0xc008919050 41 D0706 16:21:39.378704 711557 usertrap_amd64.go:225] [ 1778(16456): 1778(16456)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:39.378740 711557 usertrap_amd64.go:212] [ 1773(17033): 1773(17033)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:39.378849 711557 usertrap_amd64.go:122] [ 1773(17033): 1773(17033)] Allocate a new trap: 0xc000475800 44 D0706 16:21:39.378933 711557 usertrap_amd64.go:225] [ 1773(17033): 1773(17033)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:39.381851 711557 task_exit.go:204] [ 1764(17938): 1769(17939)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.381930 711557 task_exit.go:204] [ 1764(17938): 1769(17939)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.382053 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:39.382148 711557 task_exit.go:204] [ 1764(17938): 1764(17938)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:39 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) r1 = socket(0xb, 0x800, 0x6) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f00000000c0)={0x1, 0x4}) D0706 16:21:39.384917 711557 task_exit.go:204] [ 1773(17033): 1773(17033)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.385338 711557 task_exit.go:204] [ 1773(17033): 1773(17033)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.385303 711557 task_signals.go:204] [ 1773(17033): 1777(17034)] Signal 1773, PID: 1777, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.385570 711557 task_exit.go:204] [ 1773(17033): 1777(17034)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.394015 711557 task_exit.go:204] [ 1773(17033): 1777(17034)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.394089 711557 task_exit.go:204] [ 1773(17033): 1777(17034)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.394174 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:39.394623 711557 task_exit.go:204] [ 1773(17033): 1773(17033)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:39 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:39.452550 711557 usertrap_amd64.go:212] [ 1778(16456): 1778(16456)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:39.452660 711557 usertrap_amd64.go:122] [ 1778(16456): 1778(16456)] Allocate a new trap: 0xc008919050 42 D0706 16:21:39.452806 711557 usertrap_amd64.go:225] [ 1778(16456): 1778(16456)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:39.467043 711557 usertrap_amd64.go:212] [ 1778(16456): 1778(16456)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:39.467123 711557 usertrap_amd64.go:122] [ 1778(16456): 1778(16456)] Allocate a new trap: 0xc008919050 43 D0706 16:21:39.467199 711557 usertrap_amd64.go:225] [ 1778(16456): 1778(16456)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:39.467362 711557 usertrap_amd64.go:212] [ 1779(17943): 1779(17943)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:39.467454 711557 usertrap_amd64.go:122] [ 1779(17943): 1779(17943)] Allocate a new trap: 0xc0170606f0 40 D0706 16:21:39.468321 711557 usertrap_amd64.go:225] [ 1779(17943): 1779(17943)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:39.471206 711557 usertrap_amd64.go:212] [ 1782(17035): 1782(17035)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:39.471330 711557 usertrap_amd64.go:122] [ 1782(17035): 1782(17035)] Allocate a new trap: 0xc008510a50 40 D0706 16:21:39.471844 711557 usertrap_amd64.go:212] [ 1779(17943): 1779(17943)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:39.471964 711557 usertrap_amd64.go:122] [ 1779(17943): 1779(17943)] Allocate a new trap: 0xc0170606f0 41 D0706 16:21:39.472031 711557 usertrap_amd64.go:225] [ 1779(17943): 1779(17943)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:39.472553 711557 usertrap_amd64.go:225] [ 1782(17035): 1782(17035)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:39.475892 711557 usertrap_amd64.go:212] [ 1782(17035): 1782(17035)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:39.475959 711557 usertrap_amd64.go:122] [ 1782(17035): 1782(17035)] Allocate a new trap: 0xc008510a50 41 D0706 16:21:39.476053 711557 usertrap_amd64.go:225] [ 1782(17035): 1782(17035)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:39.476104 711557 task_exit.go:204] [ 1778(16456): 1778(16456)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.476435 711557 task_signals.go:204] [ 1778(16456): 1780(16457)] Signal 1778, PID: 1780, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.476450 711557 task_exit.go:204] [ 1778(16456): 1778(16456)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.476685 711557 task_exit.go:204] [ 1778(16456): 1780(16457)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.476832 711557 task_signals.go:204] [ 1778(16456): 1781(16458)] Signal 1778, PID: 1781, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.477574 711557 task_exit.go:204] [ 1778(16456): 1781(16458)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.477900 711557 task_exit.go:204] [ 1778(16456): 1780(16457)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.477978 711557 task_exit.go:204] [ 1778(16456): 1780(16457)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.488635 711557 task_exit.go:204] [ 1778(16456): 1781(16458)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.488705 711557 task_exit.go:204] [ 1778(16456): 1781(16458)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.488827 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:39.488998 711557 task_exit.go:204] [ 1778(16456): 1778(16456)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:39 executing program 1: ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x0, 'veth0_to_bridge\x00', {0x4}, 0x400}) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, &(0x7f0000000040)={0x9, {0x11a23262467d1270, 0x1, 0x3d9, 0x0, 0x6}}) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) pwritev(r1, &(0x7f0000001640)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="0754a27119e100bfb02ffc4ca8c93cd926da12cb0cb60997a79c9145592b8a732adab69de616edabb501f6054356d7b26d5c1bd1fef19eb54a6d3000cbdf45c60a3fc65f1c5bb5915f3903bb368a2a3931ec1049140d25240d83d57978cddf69a938285a5365679a23cada8e452c909742f20a2b6287b97d65b1b8c847255a645ba14349713ff2cb94db6d21b1bb35682b3ee52ae450e5f3eff85c11c53b12992295b0676a6193b210d5cb7e125d6ae9a7d6996008533f29979ee0058aadab27cbb3078204fd86f9e32d3aad1fc2536150", 0xd1}, {&(0x7f00000011c0)="5f0c78909e9bd651176a144c5841d4618c59b10177913513c23b3bab065ecd08a09bec81e3f1c523005265296eacd6e123765bc0729b2d6858239203d0e6160f44c58efdb8d6c98946cbf6f658718e1e29fa78342ac76ff72566390a56c682ef485159ecd64ae2f218d8a9012990f135bbf863748a402b701b2451f2718cf9865f4613dfd06077a09b30d745931dac63092ba4c34f77db10362f", 0x9a}, {&(0x7f0000001280)="027211593cc7a37fb9317392b7d9be593e224cd703bda432d2d20fe949d458129d905ddae9574a8654b7b9826581a97014a559", 0x33}, {&(0x7f00000012c0)="a81809c0fbe07e5960a0082ee32af9d04f60d1be44113bfb4d40385722d9ada0aabf48fb7a9b70ea635174f71f1688c11a2a7d9c84f490ea39d36d81608d2f7fcecdd87d2e8078be78b0716227cec4e96cb35966da02a2df33b4369923df1df7f8e9dbee160105e508b8299dd111fc6b30c76e71e2820c86fe8af5f6891b6f78621da4827aad6e66a449ec31632491cd6575a6f7425ddeb29bfc60fa32de6bebc0be80afbc1ba2dcc5720a7bd3adc33f606f81ba29b957f5584613fd12675f05c30ecdac2069d709fe1fa5e9b91a12c24b60e0bd343cc0a202dee9a0592747e87d", 0xe1}, {&(0x7f00000013c0)="75c96a69471b7510203e75b8071162d39eee2f0fdf97d9fcadb9907bb7848910ed43ac9fb396805eb966b25aef2ced8339c8c0e80298c86281489294f31a3b600370a2d23e3f4b63baaa922a065b781043a0f6d5460495be695f085355f5979e4e3f29f91678b99866b172236fc629ea43699212e10e61d8cc896276fa417ed878376d8c870a4d96a2771f478f97c9e079c4ad2cb1bcbfaba2cf97f64f5d021c90a5d66dd61e988f559593ff16fef3f59ae5c1bbbfe51e4dbdbcd59345f7", 0xbe}, {&(0x7f0000001480)="7d998ab8faca689bcdcbedceb283a4af0e80cc4a7149ec9f4a0883b1fb9ce9134c4b5bc53f5d2242d7f65cbe9ad756f3ec60ce626faec412b49247ec12cfd8e39a75caf9c861d8e8aa8133bfc88768d64d726b93d70caacc19a1ea43483dd2eec24021806b915f5bf4cc6f4b17fc29ab1d1bf232d043e467e50a76aa6607feba69a0c51b050bdabcbe103613ac4baef3ba49612c7c62973abd67365cd92d88fa8d744ee8e395f39852b652daaaad5121b3c1d3692a1e12259c", 0xb9}, {&(0x7f0000001540)="788725cbc1c2f2b2e93c4403c659b1d7cbffc2e9b333bacdbf6170704f17c906d793447ceaaf107d25b3dfc12a90b220cdfa8610208f0f40449ff8", 0x3b}, {&(0x7f0000001580)="61cdef7c227513a33a6b3147461b81a641479f5d85", 0x15}, {&(0x7f00000015c0)="cd3eee93ed48b8c5c4d6aaa09aa5b4f48984730f1bfd9bb6384b206d7f6c1fd249e5ba35e63eb150587a621d5203615204174ea011e8a481f8bc93091136c14d11c75ac393b7549642f240774483792937de9d53e0578f58015ac40267", 0x5d}], 0xa, 0x7, 0x7ff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000001700)={{r1}, {@val, @max}}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000001740)) r3 = creat(&(0x7f0000001780)='./file0\x00', 0x20) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000017c0)=0x2, 0x4) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001800)='/sys/class/net', 0x0, 0x102) close(r4) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000001840)={0x101}, 0x4) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000001880)={0x67, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e24, 0x1, 'rr\x00', 0x5, 0x3ff, 0x1b}, 0x2c) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/devices/virtual', 0x2000, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000001900)={'filter\x00', 0x4}, 0x68) r6 = accept$inet(r2, 0x0, &(0x7f0000001980)) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000019c0)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4e20, 0x5, 0x4e22, 0xff87, 0x0, 0x20, 0x80, 0x2f, 0x0, 0xee01}, {0x3, 0x7ff, 0x7f, 0x0, 0x6, 0x2, 0x2}, {0x6, 0x9, 0x4, 0x1}, 0x84d, 0x0, 0x1, 0x1, 0x3, 0x1}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x30}, 0x4d6, 0x33}, 0xa, @in6=@mcast1, 0x0, 0x2, 0x0, 0xff, 0x6, 0x10000, 0x6}}, 0xe8) r7 = dup2(r1, r1) getpeername$inet(r7, &(0x7f0000001ac0)={0x2, 0x0, @private}, &(0x7f0000001b00)=0x10) r8 = socket$inet(0x2, 0x6, 0x8) getpeername$inet(r8, &(0x7f0000001b40)={0x2, 0x0, @initdev}, &(0x7f0000001b80)=0x10) r9 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000001bc0)={0x18, 0x1, {0x5, @usage=0x6, 0x0, 0x8000, 0x1, 0x5, 0x8, 0x0, 0x32, @struct={0x3ff, 0x740}, 0xa0, 0x0, [0x8001, 0x5, 0xffffffffffffffff, 0x6, 0x4, 0x10001]}, {0x1, @struct={0xe0eb, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x3, 0x19, @struct={0x10001, 0x3}, 0x5, 0x9, [0x1, 0x751, 0x7, 0x40, 0xfffffffffffff280, 0xd37]}, {0x8, @struct={0xffff, 0x1}, 0x0, 0x0, 0x9, 0x3, 0x8, 0x1b, 0x12, @usage=0x3, 0x0, 0x56d, [0x855, 0x57a, 0x6, 0x2, 0x7, 0x80]}, {0x8, 0x8, 0x6}}) ioctl$BTRFS_IOC_BALANCE_V2(r9, 0xc4009420, &(0x7f0000001fc0)={0x0, 0x2, {0x0, @struct={0x0, 0x7}, r10, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x1, 0x4, @struct={0xffffff01, 0x101}, 0x2f, 0x34, [0x0, 0xffffffffffffffff, 0x5, 0x5, 0x8, 0x3]}, {0x9, @usage=0x8000000000000001, 0x0, 0x200, 0x81, 0x0, 0x8, 0xc6, 0x490, @struct={0x46, 0x1000}, 0x1, 0x0, [0x7, 0xfdc8, 0x2, 0x8, 0xab3e]}, {0x0, @struct={0x8001, 0xfa}, 0x0, 0x7ff, 0x6, 0x0, 0x7e3, 0x8, 0x400, @struct={0x7, 0x8}, 0x20, 0x3, [0x80, 0x4b8, 0x7, 0xff, 0x16b6, 0x8000000000000000]}, {0x4, 0x5, 0xffffffff}}) socketpair(0xb, 0x0, 0x3, &(0x7f00000023c0)={0xffffffffffffffff}) dup2(r11, r2) listen(r1, 0x4) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r12, 0x891a, &(0x7f0000002400)={'macvlan0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) D0706 16:21:39.494720 711557 usertrap_amd64.go:212] [ 1782(17035): 1782(17035)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:39.494844 711557 usertrap_amd64.go:122] [ 1782(17035): 1782(17035)] Allocate a new trap: 0xc008510a50 42 D0706 16:21:39.494917 711557 usertrap_amd64.go:225] [ 1782(17035): 1782(17035)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:39.505841 711557 usertrap_amd64.go:212] [ 1779(17943): 1779(17943)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:39.505956 711557 usertrap_amd64.go:122] [ 1779(17943): 1779(17943)] Allocate a new trap: 0xc0170606f0 42 D0706 16:21:39.506030 711557 usertrap_amd64.go:225] [ 1779(17943): 1779(17943)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:39.506656 711557 usertrap_amd64.go:212] [ 1782(17035): 1783(17036)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:39.506736 711557 usertrap_amd64.go:122] [ 1782(17035): 1783(17036)] Allocate a new trap: 0xc008510a50 43 D0706 16:21:39.506855 711557 usertrap_amd64.go:225] [ 1782(17035): 1783(17036)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:39.516351 711557 usertrap_amd64.go:212] [ 1782(17035): 1782(17035)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:39.516498 711557 usertrap_amd64.go:122] [ 1782(17035): 1782(17035)] Allocate a new trap: 0xc008510a50 44 D0706 16:21:39.516597 711557 usertrap_amd64.go:225] [ 1782(17035): 1782(17035)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:39.521837 711557 usertrap_amd64.go:212] [ 1785(16459): 1785(16459)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:39.521964 711557 usertrap_amd64.go:122] [ 1785(16459): 1785(16459)] Allocate a new trap: 0xc008510ab0 40 D0706 16:21:39.522774 711557 usertrap_amd64.go:225] [ 1785(16459): 1785(16459)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:39.523123 711557 task_exit.go:204] [ 1782(17035): 1782(17035)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.523396 711557 task_exit.go:204] [ 1782(17035): 1782(17035)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.523825 711557 task_signals.go:204] [ 1782(17035): 1783(17036)] Signal 1782, PID: 1783, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.523944 711557 task_exit.go:204] [ 1782(17035): 1783(17036)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.526850 711557 usertrap_amd64.go:212] [ 1785(16459): 1785(16459)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:39.526984 711557 usertrap_amd64.go:122] [ 1785(16459): 1785(16459)] Allocate a new trap: 0xc008510ab0 41 D0706 16:21:39.527110 711557 usertrap_amd64.go:225] [ 1785(16459): 1785(16459)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:39.532605 711557 task_exit.go:204] [ 1782(17035): 1783(17036)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.532721 711557 task_exit.go:204] [ 1782(17035): 1783(17036)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.532840 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:39.533453 711557 task_exit.go:204] [ 1782(17035): 1782(17035)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.544542 711557 usertrap_amd64.go:212] [ 1785(16459): 1785(16459)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:39.544627 711557 usertrap_amd64.go:122] [ 1785(16459): 1785(16459)] Allocate a new trap: 0xc008510ab0 42 D0706 16:21:39.544696 711557 usertrap_amd64.go:225] [ 1785(16459): 1785(16459)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:39.563469 711557 usertrap_amd64.go:212] [ 1785(16459): 1785(16459)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:39.563583 711557 usertrap_amd64.go:122] [ 1785(16459): 1785(16459)] Allocate a new trap: 0xc008510ab0 43 D0706 16:21:39.563676 711557 usertrap_amd64.go:225] [ 1785(16459): 1785(16459)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:39.567361 711557 task_exit.go:204] [ 1785(16459): 1785(16459)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.567565 711557 task_exit.go:204] [ 1785(16459): 1785(16459)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.567668 711557 task_signals.go:204] [ 1785(16459): 1786(16460)] Signal 1785, PID: 1786, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.567889 711557 task_exit.go:204] [ 1785(16459): 1786(16460)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.576419 711557 task_exit.go:204] [ 1785(16459): 1786(16460)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.576507 711557 task_exit.go:204] [ 1785(16459): 1786(16460)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.576639 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:39.577345 711557 task_exit.go:204] [ 1785(16459): 1785(16459)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.619409 711557 usertrap_amd64.go:212] [ 1779(17943): 1779(17943)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:39.619501 711557 usertrap_amd64.go:122] [ 1779(17943): 1779(17943)] Allocate a new trap: 0xc0170606f0 43 D0706 16:21:39.619570 711557 usertrap_amd64.go:225] [ 1779(17943): 1779(17943)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:39.648468 711557 usertrap_amd64.go:212] [ 1766(15775): 1766(15775)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:39.648579 711557 usertrap_amd64.go:122] [ 1766(15775): 1766(15775)] Allocate a new trap: 0xc017060690 45 D0706 16:21:39.648653 711557 usertrap_amd64.go:225] [ 1766(15775): 1766(15775)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:39.651387 711557 task_exit.go:204] [ 1766(15775): 1766(15775)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.651527 711557 task_signals.go:204] [ 1766(15775): 1771(15776)] Signal 1766, PID: 1771, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.651568 711557 task_signals.go:204] [ 1766(15775): 1774(15777)] Signal 1766, PID: 1774, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.651620 711557 task_exit.go:204] [ 1766(15775): 1771(15776)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.651995 711557 task_exit.go:204] [ 1766(15775): 1774(15777)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.653216 711557 task_exit.go:204] [ 1766(15775): 1771(15776)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.653320 711557 task_exit.go:204] [ 1766(15775): 1771(15776)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.653500 711557 task_exit.go:204] [ 1766(15775): 1766(15775)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.662840 711557 task_exit.go:204] [ 1766(15775): 1774(15777)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.662935 711557 task_exit.go:204] [ 1766(15775): 1774(15777)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.663004 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:39.663224 711557 task_exit.go:204] [ 1766(15775): 1766(15775)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:39 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:39 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:39 executing program 1: ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x0, 'veth0_to_bridge\x00', {0x4}, 0x400}) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, &(0x7f0000000040)={0x9, {0x11a23262467d1270, 0x1, 0x3d9, 0x0, 0x6}}) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) pwritev(r1, &(0x7f0000001640)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="0754a27119e100bfb02ffc4ca8c93cd926da12cb0cb60997a79c9145592b8a732adab69de616edabb501f6054356d7b26d5c1bd1fef19eb54a6d3000cbdf45c60a3fc65f1c5bb5915f3903bb368a2a3931ec1049140d25240d83d57978cddf69a938285a5365679a23cada8e452c909742f20a2b6287b97d65b1b8c847255a645ba14349713ff2cb94db6d21b1bb35682b3ee52ae450e5f3eff85c11c53b12992295b0676a6193b210d5cb7e125d6ae9a7d6996008533f29979ee0058aadab27cbb3078204fd86f9e32d3aad1fc2536150", 0xd1}, {&(0x7f00000011c0)="5f0c78909e9bd651176a144c5841d4618c59b10177913513c23b3bab065ecd08a09bec81e3f1c523005265296eacd6e123765bc0729b2d6858239203d0e6160f44c58efdb8d6c98946cbf6f658718e1e29fa78342ac76ff72566390a56c682ef485159ecd64ae2f218d8a9012990f135bbf863748a402b701b2451f2718cf9865f4613dfd06077a09b30d745931dac63092ba4c34f77db10362f", 0x9a}, {&(0x7f0000001280)="027211593cc7a37fb9317392b7d9be593e224cd703bda432d2d20fe949d458129d905ddae9574a8654b7b9826581a97014a559", 0x33}, {&(0x7f00000012c0)="a81809c0fbe07e5960a0082ee32af9d04f60d1be44113bfb4d40385722d9ada0aabf48fb7a9b70ea635174f71f1688c11a2a7d9c84f490ea39d36d81608d2f7fcecdd87d2e8078be78b0716227cec4e96cb35966da02a2df33b4369923df1df7f8e9dbee160105e508b8299dd111fc6b30c76e71e2820c86fe8af5f6891b6f78621da4827aad6e66a449ec31632491cd6575a6f7425ddeb29bfc60fa32de6bebc0be80afbc1ba2dcc5720a7bd3adc33f606f81ba29b957f5584613fd12675f05c30ecdac2069d709fe1fa5e9b91a12c24b60e0bd343cc0a202dee9a0592747e87d", 0xe1}, {&(0x7f00000013c0)="75c96a69471b7510203e75b8071162d39eee2f0fdf97d9fcadb9907bb7848910ed43ac9fb396805eb966b25aef2ced8339c8c0e80298c86281489294f31a3b600370a2d23e3f4b63baaa922a065b781043a0f6d5460495be695f085355f5979e4e3f29f91678b99866b172236fc629ea43699212e10e61d8cc896276fa417ed878376d8c870a4d96a2771f478f97c9e079c4ad2cb1bcbfaba2cf97f64f5d021c90a5d66dd61e988f559593ff16fef3f59ae5c1bbbfe51e4dbdbcd59345f7", 0xbe}, {&(0x7f0000001480)="7d998ab8faca689bcdcbedceb283a4af0e80cc4a7149ec9f4a0883b1fb9ce9134c4b5bc53f5d2242d7f65cbe9ad756f3ec60ce626faec412b49247ec12cfd8e39a75caf9c861d8e8aa8133bfc88768d64d726b93d70caacc19a1ea43483dd2eec24021806b915f5bf4cc6f4b17fc29ab1d1bf232d043e467e50a76aa6607feba69a0c51b050bdabcbe103613ac4baef3ba49612c7c62973abd67365cd92d88fa8d744ee8e395f39852b652daaaad5121b3c1d3692a1e12259c", 0xb9}, {&(0x7f0000001540)="788725cbc1c2f2b2e93c4403c659b1d7cbffc2e9b333bacdbf6170704f17c906d793447ceaaf107d25b3dfc12a90b220cdfa8610208f0f40449ff8", 0x3b}, {&(0x7f0000001580)="61cdef7c227513a33a6b3147461b81a641479f5d85", 0x15}, {&(0x7f00000015c0)="cd3eee93ed48b8c5c4d6aaa09aa5b4f48984730f1bfd9bb6384b206d7f6c1fd249e5ba35e63eb150587a621d5203615204174ea011e8a481f8bc93091136c14d11c75ac393b7549642f240774483792937de9d53e0578f58015ac40267", 0x5d}], 0xa, 0x7, 0x7ff) socket$inet_udp(0x2, 0x2, 0x0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000001700)={{r1}, {@val, @max}}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000001740)) r3 = creat(&(0x7f0000001780)='./file0\x00', 0x20) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000017c0)=0x2, 0x4) (async) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000017c0)=0x2, 0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f0000001800)='/sys/class/net', 0x0, 0x102) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001800)='/sys/class/net', 0x0, 0x102) close(r4) (async) close(r4) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000001840)={0x101}, 0x4) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000001880)={0x67, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e24, 0x1, 'rr\x00', 0x5, 0x3ff, 0x1b}, 0x2c) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/devices/virtual', 0x2000, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000001900)={'filter\x00', 0x4}, 0x68) r6 = accept$inet(r2, 0x0, &(0x7f0000001980)) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000019c0)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4e20, 0x5, 0x4e22, 0xff87, 0x0, 0x20, 0x80, 0x2f, 0x0, 0xee01}, {0x3, 0x7ff, 0x7f, 0x0, 0x6, 0x2, 0x2}, {0x6, 0x9, 0x4, 0x1}, 0x84d, 0x0, 0x1, 0x1, 0x3, 0x1}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x30}, 0x4d6, 0x33}, 0xa, @in6=@mcast1, 0x0, 0x2, 0x0, 0xff, 0x6, 0x10000, 0x6}}, 0xe8) r7 = dup2(r1, r1) getpeername$inet(r7, &(0x7f0000001ac0)={0x2, 0x0, @private}, &(0x7f0000001b00)=0x10) (async) getpeername$inet(r7, &(0x7f0000001ac0)={0x2, 0x0, @private}, &(0x7f0000001b00)=0x10) socket$inet(0x2, 0x6, 0x8) (async) r8 = socket$inet(0x2, 0x6, 0x8) getpeername$inet(r8, &(0x7f0000001b40)={0x2, 0x0, @initdev}, &(0x7f0000001b80)=0x10) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) (async) r9 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000001bc0)={0x18, 0x1, {0x5, @usage=0x6, 0x0, 0x8000, 0x1, 0x5, 0x8, 0x0, 0x32, @struct={0x3ff, 0x740}, 0xa0, 0x0, [0x8001, 0x5, 0xffffffffffffffff, 0x6, 0x4, 0x10001]}, {0x1, @struct={0xe0eb, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x3, 0x19, @struct={0x10001, 0x3}, 0x5, 0x9, [0x1, 0x751, 0x7, 0x40, 0xfffffffffffff280, 0xd37]}, {0x8, @struct={0xffff, 0x1}, 0x0, 0x0, 0x9, 0x3, 0x8, 0x1b, 0x12, @usage=0x3, 0x0, 0x56d, [0x855, 0x57a, 0x6, 0x2, 0x7, 0x80]}, {0x8, 0x8, 0x6}}) ioctl$BTRFS_IOC_BALANCE_V2(r9, 0xc4009420, &(0x7f0000001fc0)={0x0, 0x2, {0x0, @struct={0x0, 0x7}, r10, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x1, 0x4, @struct={0xffffff01, 0x101}, 0x2f, 0x34, [0x0, 0xffffffffffffffff, 0x5, 0x5, 0x8, 0x3]}, {0x9, @usage=0x8000000000000001, 0x0, 0x200, 0x81, 0x0, 0x8, 0xc6, 0x490, @struct={0x46, 0x1000}, 0x1, 0x0, [0x7, 0xfdc8, 0x2, 0x8, 0xab3e]}, {0x0, @struct={0x8001, 0xfa}, 0x0, 0x7ff, 0x6, 0x0, 0x7e3, 0x8, 0x400, @struct={0x7, 0x8}, 0x20, 0x3, [0x80, 0x4b8, 0x7, 0xff, 0x16b6, 0x8000000000000000]}, {0x4, 0x5, 0xffffffff}}) (async) ioctl$BTRFS_IOC_BALANCE_V2(r9, 0xc4009420, &(0x7f0000001fc0)={0x0, 0x2, {0x0, @struct={0x0, 0x7}, r10, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x1, 0x4, @struct={0xffffff01, 0x101}, 0x2f, 0x34, [0x0, 0xffffffffffffffff, 0x5, 0x5, 0x8, 0x3]}, {0x9, @usage=0x8000000000000001, 0x0, 0x200, 0x81, 0x0, 0x8, 0xc6, 0x490, @struct={0x46, 0x1000}, 0x1, 0x0, [0x7, 0xfdc8, 0x2, 0x8, 0xab3e]}, {0x0, @struct={0x8001, 0xfa}, 0x0, 0x7ff, 0x6, 0x0, 0x7e3, 0x8, 0x400, @struct={0x7, 0x8}, 0x20, 0x3, [0x80, 0x4b8, 0x7, 0xff, 0x16b6, 0x8000000000000000]}, {0x4, 0x5, 0xffffffff}}) socketpair(0xb, 0x0, 0x3, &(0x7f00000023c0)) (async) socketpair(0xb, 0x0, 0x3, &(0x7f00000023c0)={0xffffffffffffffff}) dup2(r11, r2) listen(r1, 0x4) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r12, 0x891a, &(0x7f0000002400)={'macvlan0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) (async) ioctl$sock_inet_SIOCSIFBRDADDR(r12, 0x891a, &(0x7f0000002400)={'macvlan0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) D0706 16:21:39.931965 711557 usertrap_amd64.go:212] [ 1790(17037): 1790(17037)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:39.932067 711557 usertrap_amd64.go:122] [ 1790(17037): 1790(17037)] Allocate a new trap: 0xc1735997d0 40 D0706 16:21:39.932659 711557 usertrap_amd64.go:212] [ 1779(17943): 1779(17943)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:39.932754 711557 usertrap_amd64.go:122] [ 1779(17943): 1779(17943)] Allocate a new trap: 0xc0170606f0 44 D0706 16:21:39.932840 711557 usertrap_amd64.go:225] [ 1779(17943): 1779(17943)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:39.933076 711557 usertrap_amd64.go:225] [ 1790(17037): 1790(17037)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:39.936732 711557 usertrap_amd64.go:212] [ 1790(17037): 1790(17037)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:39.936825 711557 usertrap_amd64.go:122] [ 1790(17037): 1790(17037)] Allocate a new trap: 0xc1735997d0 41 D0706 16:21:39.936982 711557 usertrap_amd64.go:225] [ 1790(17037): 1790(17037)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:39.938042 711557 task_exit.go:204] [ 1779(17943): 1779(17943)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.938268 711557 task_signals.go:204] [ 1779(17943): 1784(17944)] Signal 1779, PID: 1784, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.938436 711557 task_signals.go:204] [ 1779(17943): 1788(17946)] Signal 1779, PID: 1788, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.938485 711557 task_exit.go:204] [ 1779(17943): 1784(17944)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.938283 711557 task_signals.go:204] [ 1779(17943): 1789(17947)] Signal 1779, PID: 1789, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.938659 711557 task_exit.go:204] [ 1779(17943): 1788(17946)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.938811 711557 task_exit.go:204] [ 1779(17943): 1789(17947)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.939080 711557 task_exit.go:204] [ 1779(17943): 1789(17947)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.939154 711557 task_exit.go:204] [ 1779(17943): 1789(17947)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.939365 711557 task_signals.go:204] [ 1779(17943): 1787(17945)] Signal 1779, PID: 1787, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:39.939482 711557 task_exit.go:204] [ 1779(17943): 1787(17945)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:39.939801 711557 task_exit.go:204] [ 1779(17943): 1779(17943)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.940224 711557 task_exit.go:204] [ 1779(17943): 1784(17944)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.940297 711557 task_exit.go:204] [ 1779(17943): 1784(17944)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.940584 711557 task_exit.go:204] [ 1779(17943): 1787(17945)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.940705 711557 task_exit.go:204] [ 1779(17943): 1787(17945)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.956257 711557 task_exit.go:204] [ 1779(17943): 1788(17946)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:39.956630 711557 task_exit.go:204] [ 1779(17943): 1788(17946)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:39.956850 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:39.956927 711557 usertrap_amd64.go:212] [ 1790(17037): 1790(17037)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:39.957091 711557 usertrap_amd64.go:122] [ 1790(17037): 1790(17037)] Allocate a new trap: 0xc1735997d0 42 D0706 16:21:39.957207 711557 usertrap_amd64.go:225] [ 1790(17037): 1790(17037)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:39.958419 711557 task_exit.go:204] [ 1779(17943): 1779(17943)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:39 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x21d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket(0xb, 0x800, 0x6) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f00000000c0)={0x1, 0x4}) D0706 16:21:40.025804 711557 usertrap_amd64.go:212] [ 1791(16461): 1791(16461)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:40.025963 711557 usertrap_amd64.go:122] [ 1791(16461): 1791(16461)] Allocate a new trap: 0xc0151680f0 40 D0706 16:21:40.026909 711557 usertrap_amd64.go:225] [ 1791(16461): 1791(16461)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:40.030573 711557 usertrap_amd64.go:212] [ 1791(16461): 1791(16461)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:40.030672 711557 usertrap_amd64.go:122] [ 1791(16461): 1791(16461)] Allocate a new trap: 0xc0151680f0 41 D0706 16:21:40.030741 711557 usertrap_amd64.go:225] [ 1791(16461): 1791(16461)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:40.030826 711557 usertrap_amd64.go:212] [ 1790(17037): 1793(17038)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:40.030885 711557 usertrap_amd64.go:122] [ 1790(17037): 1793(17038)] Allocate a new trap: 0xc1735997d0 43 D0706 16:21:40.030959 711557 usertrap_amd64.go:225] [ 1790(17037): 1793(17038)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:40.033978 711557 usertrap_amd64.go:212] [ 1792(15778): 1792(15778)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:40.034098 711557 usertrap_amd64.go:122] [ 1792(15778): 1792(15778)] Allocate a new trap: 0xc0038edfb0 40 D0706 16:21:40.035117 711557 usertrap_amd64.go:225] [ 1792(15778): 1792(15778)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:40.044644 711557 usertrap_amd64.go:212] [ 1792(15778): 1792(15778)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:40.044725 711557 usertrap_amd64.go:122] [ 1792(15778): 1792(15778)] Allocate a new trap: 0xc0038edfb0 41 D0706 16:21:40.044857 711557 usertrap_amd64.go:225] [ 1792(15778): 1792(15778)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:40.046176 711557 usertrap_amd64.go:212] [ 1790(17037): 1790(17037)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:40.046295 711557 usertrap_amd64.go:122] [ 1790(17037): 1790(17037)] Allocate a new trap: 0xc1735997d0 44 D0706 16:21:40.046631 711557 usertrap_amd64.go:225] [ 1790(17037): 1790(17037)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:40.047478 711557 usertrap_amd64.go:212] [ 1791(16461): 1791(16461)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:40.047537 711557 usertrap_amd64.go:122] [ 1791(16461): 1791(16461)] Allocate a new trap: 0xc0151680f0 42 D0706 16:21:40.047615 711557 usertrap_amd64.go:225] [ 1791(16461): 1791(16461)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:40.051494 711557 task_exit.go:204] [ 1790(17037): 1790(17037)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.051974 711557 task_signals.go:204] [ 1790(17037): 1793(17038)] Signal 1790, PID: 1793, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.052026 711557 task_exit.go:204] [ 1790(17037): 1790(17037)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.052188 711557 task_exit.go:204] [ 1790(17037): 1793(17038)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.060548 711557 task_exit.go:204] [ 1790(17037): 1793(17038)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.060645 711557 task_exit.go:204] [ 1790(17037): 1793(17038)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.060714 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:40.061328 711557 task_exit.go:204] [ 1790(17037): 1790(17037)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:40 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:40.070020 711557 usertrap_amd64.go:212] [ 1792(15778): 1792(15778)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:40.070097 711557 usertrap_amd64.go:122] [ 1792(15778): 1792(15778)] Allocate a new trap: 0xc0038edfb0 42 D0706 16:21:40.070171 711557 usertrap_amd64.go:225] [ 1792(15778): 1792(15778)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:40.074354 711557 usertrap_amd64.go:212] [ 1794(17948): 1794(17948)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:40.074494 711557 usertrap_amd64.go:122] [ 1794(17948): 1794(17948)] Allocate a new trap: 0xc008510b10 40 D0706 16:21:40.075330 711557 usertrap_amd64.go:225] [ 1794(17948): 1794(17948)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:40.080915 711557 usertrap_amd64.go:212] [ 1791(16461): 1791(16461)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:40.081045 711557 usertrap_amd64.go:122] [ 1791(16461): 1791(16461)] Allocate a new trap: 0xc0151680f0 43 D0706 16:21:40.081197 711557 usertrap_amd64.go:225] [ 1791(16461): 1791(16461)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:40.081875 711557 usertrap_amd64.go:212] [ 1794(17948): 1794(17948)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:40.081946 711557 usertrap_amd64.go:122] [ 1794(17948): 1794(17948)] Allocate a new trap: 0xc008510b10 41 D0706 16:21:40.082054 711557 usertrap_amd64.go:225] [ 1794(17948): 1794(17948)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:40.087255 711557 usertrap_amd64.go:212] [ 1792(15778): 1797(15779)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:40.087317 711557 usertrap_amd64.go:122] [ 1792(15778): 1797(15779)] Allocate a new trap: 0xc0038edfb0 43 D0706 16:21:40.087425 711557 usertrap_amd64.go:225] [ 1792(15778): 1797(15779)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:40.088315 711557 task_exit.go:204] [ 1791(16461): 1791(16461)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.088496 711557 task_signals.go:204] [ 1791(16461): 1795(16462)] Signal 1791, PID: 1795, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.088675 711557 task_signals.go:204] [ 1791(16461): 1796(16463)] Signal 1791, PID: 1796, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.088789 711557 task_exit.go:204] [ 1791(16461): 1791(16461)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.088909 711557 task_exit.go:204] [ 1791(16461): 1795(16462)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.089289 711557 task_exit.go:204] [ 1791(16461): 1795(16462)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.089363 711557 task_exit.go:204] [ 1791(16461): 1795(16462)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.090010 711557 task_exit.go:204] [ 1791(16461): 1796(16463)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.098451 711557 usertrap_amd64.go:212] [ 1794(17948): 1794(17948)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:40.098511 711557 usertrap_amd64.go:122] [ 1794(17948): 1794(17948)] Allocate a new trap: 0xc008510b10 42 D0706 16:21:40.098585 711557 usertrap_amd64.go:225] [ 1794(17948): 1794(17948)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:40.098787 711557 task_exit.go:204] [ 1791(16461): 1796(16463)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.098871 711557 task_exit.go:204] [ 1791(16461): 1796(16463)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.098989 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:40.099374 711557 task_exit.go:204] [ 1791(16461): 1791(16461)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:40 executing program 1: ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x0, 'veth0_to_bridge\x00', {0x4}, 0x400}) (async) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, &(0x7f0000000040)={0x9, {0x11a23262467d1270, 0x1, 0x3d9, 0x0, 0x6}}) (async) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) pwritev(r1, &(0x7f0000001640)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="0754a27119e100bfb02ffc4ca8c93cd926da12cb0cb60997a79c9145592b8a732adab69de616edabb501f6054356d7b26d5c1bd1fef19eb54a6d3000cbdf45c60a3fc65f1c5bb5915f3903bb368a2a3931ec1049140d25240d83d57978cddf69a938285a5365679a23cada8e452c909742f20a2b6287b97d65b1b8c847255a645ba14349713ff2cb94db6d21b1bb35682b3ee52ae450e5f3eff85c11c53b12992295b0676a6193b210d5cb7e125d6ae9a7d6996008533f29979ee0058aadab27cbb3078204fd86f9e32d3aad1fc2536150", 0xd1}, {&(0x7f00000011c0)="5f0c78909e9bd651176a144c5841d4618c59b10177913513c23b3bab065ecd08a09bec81e3f1c523005265296eacd6e123765bc0729b2d6858239203d0e6160f44c58efdb8d6c98946cbf6f658718e1e29fa78342ac76ff72566390a56c682ef485159ecd64ae2f218d8a9012990f135bbf863748a402b701b2451f2718cf9865f4613dfd06077a09b30d745931dac63092ba4c34f77db10362f", 0x9a}, {&(0x7f0000001280)="027211593cc7a37fb9317392b7d9be593e224cd703bda432d2d20fe949d458129d905ddae9574a8654b7b9826581a97014a559", 0x33}, {&(0x7f00000012c0)="a81809c0fbe07e5960a0082ee32af9d04f60d1be44113bfb4d40385722d9ada0aabf48fb7a9b70ea635174f71f1688c11a2a7d9c84f490ea39d36d81608d2f7fcecdd87d2e8078be78b0716227cec4e96cb35966da02a2df33b4369923df1df7f8e9dbee160105e508b8299dd111fc6b30c76e71e2820c86fe8af5f6891b6f78621da4827aad6e66a449ec31632491cd6575a6f7425ddeb29bfc60fa32de6bebc0be80afbc1ba2dcc5720a7bd3adc33f606f81ba29b957f5584613fd12675f05c30ecdac2069d709fe1fa5e9b91a12c24b60e0bd343cc0a202dee9a0592747e87d", 0xe1}, {&(0x7f00000013c0)="75c96a69471b7510203e75b8071162d39eee2f0fdf97d9fcadb9907bb7848910ed43ac9fb396805eb966b25aef2ced8339c8c0e80298c86281489294f31a3b600370a2d23e3f4b63baaa922a065b781043a0f6d5460495be695f085355f5979e4e3f29f91678b99866b172236fc629ea43699212e10e61d8cc896276fa417ed878376d8c870a4d96a2771f478f97c9e079c4ad2cb1bcbfaba2cf97f64f5d021c90a5d66dd61e988f559593ff16fef3f59ae5c1bbbfe51e4dbdbcd59345f7", 0xbe}, {&(0x7f0000001480)="7d998ab8faca689bcdcbedceb283a4af0e80cc4a7149ec9f4a0883b1fb9ce9134c4b5bc53f5d2242d7f65cbe9ad756f3ec60ce626faec412b49247ec12cfd8e39a75caf9c861d8e8aa8133bfc88768d64d726b93d70caacc19a1ea43483dd2eec24021806b915f5bf4cc6f4b17fc29ab1d1bf232d043e467e50a76aa6607feba69a0c51b050bdabcbe103613ac4baef3ba49612c7c62973abd67365cd92d88fa8d744ee8e395f39852b652daaaad5121b3c1d3692a1e12259c", 0xb9}, {&(0x7f0000001540)="788725cbc1c2f2b2e93c4403c659b1d7cbffc2e9b333bacdbf6170704f17c906d793447ceaaf107d25b3dfc12a90b220cdfa8610208f0f40449ff8", 0x3b}, {&(0x7f0000001580)="61cdef7c227513a33a6b3147461b81a641479f5d85", 0x15}, {&(0x7f00000015c0)="cd3eee93ed48b8c5c4d6aaa09aa5b4f48984730f1bfd9bb6384b206d7f6c1fd249e5ba35e63eb150587a621d5203615204174ea011e8a481f8bc93091136c14d11c75ac393b7549642f240774483792937de9d53e0578f58015ac40267", 0x5d}], 0xa, 0x7, 0x7ff) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000001700)={{r1}, {@val, @max}}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000001740)) (async) r3 = creat(&(0x7f0000001780)='./file0\x00', 0x20) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000017c0)=0x2, 0x4) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001800)='/sys/class/net', 0x0, 0x102) close(r4) (async) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000001840)={0x101}, 0x4) (async) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000001880)={0x67, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e24, 0x1, 'rr\x00', 0x5, 0x3ff, 0x1b}, 0x2c) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/devices/virtual', 0x2000, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000001900)={'filter\x00', 0x4}, 0x68) r6 = accept$inet(r2, 0x0, &(0x7f0000001980)) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000019c0)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4e20, 0x5, 0x4e22, 0xff87, 0x0, 0x20, 0x80, 0x2f, 0x0, 0xee01}, {0x3, 0x7ff, 0x7f, 0x0, 0x6, 0x2, 0x2}, {0x6, 0x9, 0x4, 0x1}, 0x84d, 0x0, 0x1, 0x1, 0x3, 0x1}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x30}, 0x4d6, 0x33}, 0xa, @in6=@mcast1, 0x0, 0x2, 0x0, 0xff, 0x6, 0x10000, 0x6}}, 0xe8) (async) r7 = dup2(r1, r1) getpeername$inet(r7, &(0x7f0000001ac0)={0x2, 0x0, @private}, &(0x7f0000001b00)=0x10) r8 = socket$inet(0x2, 0x6, 0x8) getpeername$inet(r8, &(0x7f0000001b40)={0x2, 0x0, @initdev}, &(0x7f0000001b80)=0x10) (async) r9 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000001bc0)={0x18, 0x1, {0x5, @usage=0x6, 0x0, 0x8000, 0x1, 0x5, 0x8, 0x0, 0x32, @struct={0x3ff, 0x740}, 0xa0, 0x0, [0x8001, 0x5, 0xffffffffffffffff, 0x6, 0x4, 0x10001]}, {0x1, @struct={0xe0eb, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x3, 0x19, @struct={0x10001, 0x3}, 0x5, 0x9, [0x1, 0x751, 0x7, 0x40, 0xfffffffffffff280, 0xd37]}, {0x8, @struct={0xffff, 0x1}, 0x0, 0x0, 0x9, 0x3, 0x8, 0x1b, 0x12, @usage=0x3, 0x0, 0x56d, [0x855, 0x57a, 0x6, 0x2, 0x7, 0x80]}, {0x8, 0x8, 0x6}}) (rerun: 64) ioctl$BTRFS_IOC_BALANCE_V2(r9, 0xc4009420, &(0x7f0000001fc0)={0x0, 0x2, {0x0, @struct={0x0, 0x7}, r10, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x1, 0x4, @struct={0xffffff01, 0x101}, 0x2f, 0x34, [0x0, 0xffffffffffffffff, 0x5, 0x5, 0x8, 0x3]}, {0x9, @usage=0x8000000000000001, 0x0, 0x200, 0x81, 0x0, 0x8, 0xc6, 0x490, @struct={0x46, 0x1000}, 0x1, 0x0, [0x7, 0xfdc8, 0x2, 0x8, 0xab3e]}, {0x0, @struct={0x8001, 0xfa}, 0x0, 0x7ff, 0x6, 0x0, 0x7e3, 0x8, 0x400, @struct={0x7, 0x8}, 0x20, 0x3, [0x80, 0x4b8, 0x7, 0xff, 0x16b6, 0x8000000000000000]}, {0x4, 0x5, 0xffffffff}}) socketpair(0xb, 0x0, 0x3, &(0x7f00000023c0)={0xffffffffffffffff}) dup2(r11, r2) listen(r1, 0x4) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r12, 0x891a, &(0x7f0000002400)={'macvlan0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) D0706 16:21:40.102909 711557 usertrap_amd64.go:212] [ 1798(17039): 1798(17039)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:40.103005 711557 usertrap_amd64.go:122] [ 1798(17039): 1798(17039)] Allocate a new trap: 0xc017060720 40 D0706 16:21:40.103767 711557 usertrap_amd64.go:225] [ 1798(17039): 1798(17039)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:40.109265 711557 usertrap_amd64.go:212] [ 1798(17039): 1798(17039)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:40.109343 711557 usertrap_amd64.go:122] [ 1798(17039): 1798(17039)] Allocate a new trap: 0xc017060720 41 D0706 16:21:40.109412 711557 usertrap_amd64.go:225] [ 1798(17039): 1798(17039)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:40.125511 711557 usertrap_amd64.go:212] [ 1798(17039): 1798(17039)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:40.125561 711557 usertrap_amd64.go:122] [ 1798(17039): 1798(17039)] Allocate a new trap: 0xc017060720 42 D0706 16:21:40.125623 711557 usertrap_amd64.go:225] [ 1798(17039): 1798(17039)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:40.126521 711557 usertrap_amd64.go:212] [ 1801(16464): 1801(16464)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:40.126614 711557 usertrap_amd64.go:122] [ 1801(16464): 1801(16464)] Allocate a new trap: 0xc173599860 40 D0706 16:21:40.127281 711557 usertrap_amd64.go:225] [ 1801(16464): 1801(16464)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:40.130163 711557 usertrap_amd64.go:212] [ 1801(16464): 1801(16464)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:40.130261 711557 usertrap_amd64.go:122] [ 1801(16464): 1801(16464)] Allocate a new trap: 0xc173599860 41 D0706 16:21:40.130426 711557 usertrap_amd64.go:225] [ 1801(16464): 1801(16464)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:40.131305 711557 usertrap_amd64.go:212] [ 1798(17039): 1802(17040)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:40.131362 711557 usertrap_amd64.go:122] [ 1798(17039): 1802(17040)] Allocate a new trap: 0xc017060720 43 D0706 16:21:40.131430 711557 usertrap_amd64.go:225] [ 1798(17039): 1802(17040)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:40.139580 711557 usertrap_amd64.go:212] [ 1798(17039): 1798(17039)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:40.139635 711557 usertrap_amd64.go:122] [ 1798(17039): 1798(17039)] Allocate a new trap: 0xc017060720 44 D0706 16:21:40.139681 711557 usertrap_amd64.go:225] [ 1798(17039): 1798(17039)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:40.143322 711557 task_exit.go:204] [ 1798(17039): 1798(17039)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.143533 711557 task_exit.go:204] [ 1798(17039): 1798(17039)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.143649 711557 task_signals.go:204] [ 1798(17039): 1802(17040)] Signal 1798, PID: 1802, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.143772 711557 task_exit.go:204] [ 1798(17039): 1802(17040)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.144762 711557 usertrap_amd64.go:212] [ 1801(16464): 1801(16464)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:40.144816 711557 usertrap_amd64.go:122] [ 1801(16464): 1801(16464)] Allocate a new trap: 0xc173599860 42 D0706 16:21:40.144901 711557 usertrap_amd64.go:225] [ 1801(16464): 1801(16464)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:40.151178 711557 task_exit.go:204] [ 1798(17039): 1802(17040)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.151245 711557 task_exit.go:204] [ 1798(17039): 1802(17040)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.151363 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:40.151477 711557 task_exit.go:204] [ 1798(17039): 1798(17039)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:40 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r0, r1+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:40.155244 711557 usertrap_amd64.go:212] [ 1792(15778): 1792(15778)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:40.155303 711557 usertrap_amd64.go:122] [ 1792(15778): 1792(15778)] Allocate a new trap: 0xc0038edfb0 44 D0706 16:21:40.155369 711557 usertrap_amd64.go:225] [ 1792(15778): 1792(15778)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:40.160445 711557 usertrap_amd64.go:212] [ 1801(16464): 1801(16464)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:40.160527 711557 usertrap_amd64.go:122] [ 1801(16464): 1801(16464)] Allocate a new trap: 0xc173599860 43 D0706 16:21:40.160612 711557 usertrap_amd64.go:225] [ 1801(16464): 1801(16464)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:40.164397 711557 task_exit.go:204] [ 1801(16464): 1801(16464)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.164548 711557 task_signals.go:204] [ 1801(16464): 1806(16467)] Signal 1801, PID: 1806, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.164609 711557 task_signals.go:204] [ 1801(16464): 1803(16465)] Signal 1801, PID: 1803, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.164756 711557 task_signals.go:204] [ 1801(16464): 1804(16466)] Signal 1801, PID: 1804, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.164843 711557 task_exit.go:204] [ 1801(16464): 1806(16467)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.165106 711557 task_exit.go:204] [ 1801(16464): 1803(16465)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.165281 711557 task_exit.go:204] [ 1801(16464): 1801(16464)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.165511 711557 task_exit.go:204] [ 1801(16464): 1804(16466)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.165868 711557 task_exit.go:204] [ 1801(16464): 1806(16467)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.165956 711557 task_exit.go:204] [ 1801(16464): 1806(16467)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.166228 711557 task_exit.go:204] [ 1801(16464): 1804(16466)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.166294 711557 task_exit.go:204] [ 1801(16464): 1804(16466)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.172783 711557 task_exit.go:204] [ 1801(16464): 1803(16465)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.172839 711557 task_exit.go:204] [ 1801(16464): 1803(16465)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.172931 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:40.173319 711557 task_exit.go:204] [ 1801(16464): 1801(16464)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:40 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0x5451, 0x0) D0706 16:21:40.264107 711557 usertrap_amd64.go:212] [ 1794(17948): 1794(17948)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:40.264189 711557 usertrap_amd64.go:122] [ 1794(17948): 1794(17948)] Allocate a new trap: 0xc008510b10 43 D0706 16:21:40.264260 711557 usertrap_amd64.go:225] [ 1794(17948): 1794(17948)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:40.461858 711557 usertrap_amd64.go:212] [ 1794(17948): 1794(17948)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:40.461986 711557 usertrap_amd64.go:122] [ 1794(17948): 1794(17948)] Allocate a new trap: 0xc008510b10 44 D0706 16:21:40.462074 711557 usertrap_amd64.go:225] [ 1794(17948): 1794(17948)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:40.467347 711557 task_exit.go:204] [ 1794(17948): 1794(17948)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.467662 711557 task_signals.go:204] [ 1794(17948): 1799(17949)] Signal 1794, PID: 1799, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.467831 711557 task_signals.go:204] [ 1794(17948): 1808(17952)] Signal 1794, PID: 1808, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.467865 711557 task_exit.go:204] [ 1794(17948): 1799(17949)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.467995 711557 task_exit.go:204] [ 1794(17948): 1808(17952)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.468130 711557 task_signals.go:204] [ 1794(17948): 1807(17951)] Signal 1794, PID: 1807, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.468287 711557 task_signals.go:204] [ 1794(17948): 1800(17950)] Signal 1794, PID: 1800, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.468472 711557 task_exit.go:204] [ 1794(17948): 1799(17949)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.468536 711557 task_exit.go:204] [ 1794(17948): 1799(17949)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.468678 711557 task_exit.go:204] [ 1794(17948): 1794(17948)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.468819 711557 task_exit.go:204] [ 1794(17948): 1807(17951)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.468986 711557 task_exit.go:204] [ 1794(17948): 1800(17950)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.469442 711557 task_exit.go:204] [ 1794(17948): 1800(17950)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.469517 711557 task_exit.go:204] [ 1794(17948): 1800(17950)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.469619 711557 task_exit.go:204] [ 1794(17948): 1808(17952)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.469682 711557 task_exit.go:204] [ 1794(17948): 1808(17952)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.479708 711557 task_exit.go:204] [ 1794(17948): 1807(17951)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.479823 711557 task_exit.go:204] [ 1794(17948): 1807(17951)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.479932 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:40.480391 711557 task_exit.go:204] [ 1794(17948): 1794(17948)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.557961 711557 usertrap_amd64.go:212] [ 1810(16468): 1810(16468)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:40.558076 711557 usertrap_amd64.go:122] [ 1810(16468): 1810(16468)] Allocate a new trap: 0xc0089190e0 40 D0706 16:21:40.558886 711557 usertrap_amd64.go:225] [ 1810(16468): 1810(16468)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:40.561724 711557 usertrap_amd64.go:212] [ 1809(17041): 1809(17041)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:40.561853 711557 usertrap_amd64.go:122] [ 1809(17041): 1809(17041)] Allocate a new trap: 0xc015168120 40 D0706 16:21:40.561932 711557 usertrap_amd64.go:212] [ 1810(16468): 1810(16468)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:40.562048 711557 usertrap_amd64.go:122] [ 1810(16468): 1810(16468)] Allocate a new trap: 0xc0089190e0 41 D0706 16:21:40.562204 711557 usertrap_amd64.go:225] [ 1810(16468): 1810(16468)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:40.562622 711557 usertrap_amd64.go:225] [ 1809(17041): 1809(17041)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:40.566016 711557 usertrap_amd64.go:212] [ 1809(17041): 1809(17041)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:40.566143 711557 usertrap_amd64.go:122] [ 1809(17041): 1809(17041)] Allocate a new trap: 0xc015168120 41 D0706 16:21:40.566321 711557 usertrap_amd64.go:225] [ 1809(17041): 1809(17041)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:40.588388 711557 usertrap_amd64.go:212] [ 1810(16468): 1810(16468)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:40.588498 711557 usertrap_amd64.go:122] [ 1810(16468): 1810(16468)] Allocate a new trap: 0xc0089190e0 42 D0706 16:21:40.588606 711557 usertrap_amd64.go:225] [ 1810(16468): 1810(16468)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:40.596375 711557 usertrap_amd64.go:212] [ 1809(17041): 1809(17041)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:40.596472 711557 usertrap_amd64.go:122] [ 1809(17041): 1809(17041)] Allocate a new trap: 0xc015168120 42 D0706 16:21:40.596554 711557 usertrap_amd64.go:225] [ 1809(17041): 1809(17041)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:40.601939 711557 usertrap_amd64.go:212] [ 1810(16468): 1810(16468)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:40.602084 711557 usertrap_amd64.go:122] [ 1810(16468): 1810(16468)] Allocate a new trap: 0xc0089190e0 43 D0706 16:21:40.602307 711557 usertrap_amd64.go:225] [ 1810(16468): 1810(16468)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:40.611924 711557 usertrap_amd64.go:212] [ 1809(17041): 1812(17042)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:40.612015 711557 usertrap_amd64.go:122] [ 1809(17041): 1812(17042)] Allocate a new trap: 0xc015168120 43 D0706 16:21:40.612117 711557 usertrap_amd64.go:225] [ 1809(17041): 1812(17042)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:40.612435 711557 task_exit.go:204] [ 1810(16468): 1810(16468)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.612722 711557 task_signals.go:204] [ 1810(16468): 1811(16469)] Signal 1810, PID: 1811, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.612765 711557 task_exit.go:204] [ 1810(16468): 1810(16468)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.612823 711557 task_exit.go:204] [ 1810(16468): 1811(16469)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.620096 711557 task_exit.go:204] [ 1810(16468): 1811(16469)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.620203 711557 task_exit.go:204] [ 1810(16468): 1811(16469)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.620306 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:40.620576 711557 task_exit.go:204] [ 1810(16468): 1810(16468)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.627949 711557 usertrap_amd64.go:212] [ 1809(17041): 1809(17041)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:40.628055 711557 usertrap_amd64.go:122] [ 1809(17041): 1809(17041)] Allocate a new trap: 0xc015168120 44 D0706 16:21:40.628144 711557 usertrap_amd64.go:225] [ 1809(17041): 1809(17041)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:40.634242 711557 task_exit.go:204] [ 1809(17041): 1809(17041)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.634541 711557 task_signals.go:204] [ 1809(17041): 1812(17042)] Signal 1809, PID: 1812, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.634734 711557 task_exit.go:204] [ 1809(17041): 1812(17042)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.635015 711557 task_exit.go:204] [ 1809(17041): 1809(17041)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.648395 711557 task_exit.go:204] [ 1809(17041): 1812(17042)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.648500 711557 task_exit.go:204] [ 1809(17041): 1812(17042)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.648606 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:40.649642 711557 task_exit.go:204] [ 1809(17041): 1809(17041)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.892298 711557 usertrap_amd64.go:212] [ 1792(15778): 1792(15778)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:40.892386 711557 usertrap_amd64.go:122] [ 1792(15778): 1792(15778)] Allocate a new trap: 0xc0038edfb0 45 D0706 16:21:40.892489 711557 usertrap_amd64.go:225] [ 1792(15778): 1792(15778)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:40.894346 711557 task_exit.go:204] [ 1792(15778): 1792(15778)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.894502 711557 task_signals.go:204] [ 1792(15778): 1805(15780)] Signal 1792, PID: 1805, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.894550 711557 task_exit.go:204] [ 1792(15778): 1792(15778)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.894544 711557 task_signals.go:204] [ 1792(15778): 1797(15779)] Signal 1792, PID: 1797, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:40.894674 711557 task_exit.go:204] [ 1792(15778): 1805(15780)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.894805 711557 task_exit.go:204] [ 1792(15778): 1805(15780)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.894859 711557 task_exit.go:204] [ 1792(15778): 1805(15780)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.894987 711557 task_exit.go:204] [ 1792(15778): 1797(15779)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:40.902825 711557 task_exit.go:204] [ 1792(15778): 1797(15779)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:40.902904 711557 task_exit.go:204] [ 1792(15778): 1797(15779)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:40.903016 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:40.903173 711557 task_exit.go:204] [ 1792(15778): 1792(15778)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:40 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:40 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r0, r1+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) 16:21:40 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1054c2, 0x4a) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = socket$inet_icmp(0x2, 0x2, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r4 = dup3(r2, r3, 0x0) fcntl$dupfd(r1, 0x406, r2) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r6 = dup3(r1, r5, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000200)=""/103, 0x67}], 0x2, 0x0, 0x3) inotify_init() setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) close(r3) setrlimit(0x5, &(0x7f0000000100)={0x1, 0x7f}) utime(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0xd, &(0x7f0000000280)) setrlimit(0xd, &(0x7f00000000c0)={0xffff, 0x404}) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300), 0x82805, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, '&-*@'}}, {@access_any}, {@msize={'msize', 0x3d, 0xffffffffffffff53}}], [{@flag='mand'}, {@obj_type={'obj_type', 0x3d, 'limits\x00'}}, {@dont_appraise}, {@appraise_type}, {@smackfstransmute={'smackfstransmute', 0x3d, '(}\xe5]:'}}, {@uid_gt={'uid>', r7}}, {@seclabel}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'limits\x00'}}]}}) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) 16:21:40 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) (async) socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0x5451, 0x0) D0706 16:21:40.933201 711557 usertrap_amd64.go:212] [ 1813(16470): 1813(16470)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:40.933305 711557 usertrap_amd64.go:122] [ 1813(16470): 1813(16470)] Allocate a new trap: 0xc008919140 40 D0706 16:21:40.934244 711557 usertrap_amd64.go:225] [ 1813(16470): 1813(16470)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:40.936830 711557 usertrap_amd64.go:212] [ 1814(17043): 1814(17043)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:40.937002 711557 usertrap_amd64.go:122] [ 1814(17043): 1814(17043)] Allocate a new trap: 0xc16ed8f7a0 40 D0706 16:21:40.937899 711557 usertrap_amd64.go:225] [ 1814(17043): 1814(17043)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:40.939908 711557 usertrap_amd64.go:212] [ 1813(16470): 1813(16470)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:40.940053 711557 usertrap_amd64.go:122] [ 1813(16470): 1813(16470)] Allocate a new trap: 0xc008919140 41 D0706 16:21:40.940234 711557 usertrap_amd64.go:225] [ 1813(16470): 1813(16470)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:40.941005 711557 usertrap_amd64.go:212] [ 1816(15781): 1816(15781)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:40.941079 711557 usertrap_amd64.go:122] [ 1816(15781): 1816(15781)] Allocate a new trap: 0xc017060810 40 D0706 16:21:40.941351 711557 usertrap_amd64.go:212] [ 1814(17043): 1814(17043)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:40.941420 711557 usertrap_amd64.go:122] [ 1814(17043): 1814(17043)] Allocate a new trap: 0xc16ed8f7a0 41 D0706 16:21:40.941496 711557 usertrap_amd64.go:225] [ 1814(17043): 1814(17043)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:40.941977 711557 usertrap_amd64.go:225] [ 1816(15781): 1816(15781)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:40.945388 711557 usertrap_amd64.go:212] [ 1815(17953): 1815(17953)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:40.945510 711557 usertrap_amd64.go:122] [ 1815(17953): 1815(17953)] Allocate a new trap: 0xc0170607e0 40 D0706 16:21:40.949112 711557 usertrap_amd64.go:225] [ 1815(17953): 1815(17953)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:40.949898 711557 usertrap_amd64.go:212] [ 1816(15781): 1816(15781)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:40.950030 711557 usertrap_amd64.go:122] [ 1816(15781): 1816(15781)] Allocate a new trap: 0xc017060810 41 D0706 16:21:40.950132 711557 usertrap_amd64.go:225] [ 1816(15781): 1816(15781)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:40.953743 711557 usertrap_amd64.go:212] [ 1815(17953): 1815(17953)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:40.953896 711557 usertrap_amd64.go:122] [ 1815(17953): 1815(17953)] Allocate a new trap: 0xc0170607e0 41 D0706 16:21:40.953976 711557 usertrap_amd64.go:225] [ 1815(17953): 1815(17953)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:40.967970 711557 usertrap_amd64.go:212] [ 1814(17043): 1814(17043)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:40.968057 711557 usertrap_amd64.go:122] [ 1814(17043): 1814(17043)] Allocate a new trap: 0xc16ed8f7a0 42 D0706 16:21:40.968118 711557 usertrap_amd64.go:225] [ 1814(17043): 1814(17043)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:40.972308 711557 usertrap_amd64.go:212] [ 1816(15781): 1816(15781)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:40.972392 711557 usertrap_amd64.go:122] [ 1816(15781): 1816(15781)] Allocate a new trap: 0xc017060810 42 D0706 16:21:40.972517 711557 usertrap_amd64.go:225] [ 1816(15781): 1816(15781)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:40.981576 711557 usertrap_amd64.go:212] [ 1814(17043): 1817(17044)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:40.981683 711557 usertrap_amd64.go:122] [ 1814(17043): 1817(17044)] Allocate a new trap: 0xc16ed8f7a0 43 D0706 16:21:40.981750 711557 usertrap_amd64.go:225] [ 1814(17043): 1817(17044)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:40.982298 711557 usertrap_amd64.go:212] [ 1813(16470): 1813(16470)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:40.982361 711557 usertrap_amd64.go:122] [ 1813(16470): 1813(16470)] Allocate a new trap: 0xc008919140 42 D0706 16:21:40.982424 711557 usertrap_amd64.go:225] [ 1813(16470): 1813(16470)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:40.984259 711557 usertrap_amd64.go:212] [ 1815(17953): 1815(17953)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:40.984389 711557 usertrap_amd64.go:122] [ 1815(17953): 1815(17953)] Allocate a new trap: 0xc0170607e0 42 D0706 16:21:40.984491 711557 usertrap_amd64.go:225] [ 1815(17953): 1815(17953)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:40.992555 711557 usertrap_amd64.go:212] [ 1813(16470): 1813(16470)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:40.992668 711557 usertrap_amd64.go:122] [ 1813(16470): 1813(16470)] Allocate a new trap: 0xc008919140 43 D0706 16:21:40.992813 711557 usertrap_amd64.go:225] [ 1813(16470): 1813(16470)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:40.995112 711557 usertrap_amd64.go:212] [ 1814(17043): 1814(17043)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:40.995132 711557 usertrap_amd64.go:212] [ 1815(17953): 1820(17954)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:40.995185 711557 usertrap_amd64.go:122] [ 1814(17043): 1814(17043)] Allocate a new trap: 0xc16ed8f7a0 44 D0706 16:21:40.995197 711557 usertrap_amd64.go:122] [ 1815(17953): 1820(17954)] Allocate a new trap: 0xc0170607e0 43 D0706 16:21:40.995258 711557 usertrap_amd64.go:225] [ 1814(17043): 1814(17043)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:40.995321 711557 usertrap_amd64.go:225] [ 1815(17953): 1820(17954)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:40.997575 711557 usertrap_amd64.go:212] [ 1816(15781): 1818(15782)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:40.997632 711557 usertrap_amd64.go:122] [ 1816(15781): 1818(15782)] Allocate a new trap: 0xc017060810 43 D0706 16:21:40.997743 711557 usertrap_amd64.go:225] [ 1816(15781): 1818(15782)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:41.000704 711557 task_signals.go:204] [ 1813(16470): 1819(16471)] Signal 1813, PID: 1819, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.000727 711557 task_signals.go:204] [ 1813(16470): 1821(16472)] Signal 1813, PID: 1821, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.001328 711557 task_signals.go:204] [ 1814(17043): 1817(17044)] Signal 1814, PID: 1817, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.001339 711557 task_exit.go:204] [ 1814(17043): 1814(17043)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.001538 711557 task_exit.go:204] [ 1814(17043): 1817(17044)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.001853 711557 task_exit.go:204] [ 1814(17043): 1814(17043)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.001967 711557 task_exit.go:204] [ 1813(16470): 1813(16470)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.002221 711557 task_exit.go:204] [ 1813(16470): 1813(16470)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.002360 711557 task_exit.go:204] [ 1813(16470): 1819(16471)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.002750 711557 task_exit.go:204] [ 1813(16470): 1819(16471)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.002922 711557 task_exit.go:204] [ 1813(16470): 1819(16471)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.003264 711557 task_exit.go:204] [ 1813(16470): 1821(16472)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.013803 711557 task_exit.go:204] [ 1813(16470): 1821(16472)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.013887 711557 task_exit.go:204] [ 1813(16470): 1821(16472)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.013980 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:41.014099 711557 task_exit.go:204] [ 1813(16470): 1813(16470)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.014511 711557 task_exit.go:204] [ 1814(17043): 1817(17044)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.014839 711557 task_exit.go:204] [ 1814(17043): 1817(17044)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.015039 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 16:21:41 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) (async) recvmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0x5451, 0x0) D0706 16:21:41.015255 711557 task_exit.go:204] [ 1814(17043): 1814(17043)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.016755 711557 usertrap_amd64.go:212] [ 1815(17953): 1815(17953)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:41.016816 711557 usertrap_amd64.go:122] [ 1815(17953): 1815(17953)] Allocate a new trap: 0xc0170607e0 44 D0706 16:21:41.016926 711557 usertrap_amd64.go:225] [ 1815(17953): 1815(17953)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) 16:21:41 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r0, r1+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:41.022753 711557 task_exit.go:204] [ 1815(17953): 1815(17953)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.022973 711557 task_exit.go:204] [ 1815(17953): 1815(17953)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.023108 711557 task_signals.go:204] [ 1815(17953): 1820(17954)] Signal 1815, PID: 1820, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.023217 711557 task_exit.go:204] [ 1815(17953): 1820(17954)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.031031 711557 task_exit.go:204] [ 1815(17953): 1820(17954)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.031132 711557 task_exit.go:204] [ 1815(17953): 1820(17954)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.031220 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:41.031847 711557 task_exit.go:204] [ 1815(17953): 1815(17953)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:41 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1054c2, 0x4a) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = socket$inet_icmp(0x2, 0x2, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r4 = dup3(r2, r3, 0x0) fcntl$dupfd(r1, 0x406, r2) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r6 = dup3(r1, r5, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000200)=""/103, 0x67}], 0x2, 0x0, 0x3) inotify_init() setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) close(r3) setrlimit(0x5, &(0x7f0000000100)={0x1, 0x7f}) utime(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0xd, &(0x7f0000000280)) setrlimit(0xd, &(0x7f00000000c0)={0xffff, 0x404}) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300), 0x82805, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, '&-*@'}}, {@access_any}, {@msize={'msize', 0x3d, 0xffffffffffffff53}}], [{@flag='mand'}, {@obj_type={'obj_type', 0x3d, 'limits\x00'}}, {@dont_appraise}, {@appraise_type}, {@smackfstransmute={'smackfstransmute', 0x3d, '(}\xe5]:'}}, {@uid_gt={'uid>', r7}}, {@seclabel}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'limits\x00'}}]}}) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x1054c2, 0x4a) (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') (async) dup3(r2, r3, 0x0) (async) fcntl$dupfd(r1, 0x406, r2) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') (async) dup3(r1, r5, 0x0) (async) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000200)=""/103, 0x67}], 0x2, 0x0, 0x3) (async) inotify_init() (async) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) (async) close(r3) (async) setrlimit(0x5, &(0x7f0000000100)={0x1, 0x7f}) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) getrlimit(0xd, &(0x7f0000000280)) (async) setrlimit(0xd, &(0x7f00000000c0)={0xffff, 0x404}) (async) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)) (async) mount$9p_fd(0x0, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300), 0x82805, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, '&-*@'}}, {@access_any}, {@msize={'msize', 0x3d, 0xffffffffffffff53}}], [{@flag='mand'}, {@obj_type={'obj_type', 0x3d, 'limits\x00'}}, {@dont_appraise}, {@appraise_type}, {@smackfstransmute={'smackfstransmute', 0x3d, '(}\xe5]:'}}, {@uid_gt={'uid>', r7}}, {@seclabel}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'limits\x00'}}]}}) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) (async) D0706 16:21:41.045846 711557 usertrap_amd64.go:212] [ 1822(17045): 1822(17045)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:41.045967 711557 usertrap_amd64.go:122] [ 1822(17045): 1822(17045)] Allocate a new trap: 0xc015168180 40 D0706 16:21:41.046763 711557 usertrap_amd64.go:225] [ 1822(17045): 1822(17045)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:41.053123 711557 usertrap_amd64.go:212] [ 1823(16473): 1823(16473)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:41.053234 711557 usertrap_amd64.go:122] [ 1823(16473): 1823(16473)] Allocate a new trap: 0xc0170608a0 40 D0706 16:21:41.053625 711557 usertrap_amd64.go:212] [ 1822(17045): 1822(17045)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:41.053688 711557 usertrap_amd64.go:122] [ 1822(17045): 1822(17045)] Allocate a new trap: 0xc015168180 41 D0706 16:21:41.053859 711557 usertrap_amd64.go:225] [ 1822(17045): 1822(17045)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:41.054014 711557 usertrap_amd64.go:225] [ 1823(16473): 1823(16473)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:41.065289 711557 usertrap_amd64.go:212] [ 1816(15781): 1816(15781)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:41.065486 711557 usertrap_amd64.go:122] [ 1816(15781): 1816(15781)] Allocate a new trap: 0xc017060810 44 D0706 16:21:41.065633 711557 usertrap_amd64.go:225] [ 1816(15781): 1816(15781)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:41.069218 711557 usertrap_amd64.go:212] [ 1823(16473): 1823(16473)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:41.069377 711557 usertrap_amd64.go:122] [ 1823(16473): 1823(16473)] Allocate a new trap: 0xc0170608a0 41 D0706 16:21:41.069527 711557 usertrap_amd64.go:225] [ 1823(16473): 1823(16473)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:41.075539 711557 usertrap_amd64.go:212] [ 1825(17955): 1825(17955)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:41.075631 711557 usertrap_amd64.go:122] [ 1825(17955): 1825(17955)] Allocate a new trap: 0xc0151681b0 40 D0706 16:21:41.076487 711557 usertrap_amd64.go:225] [ 1825(17955): 1825(17955)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:41.081101 711557 usertrap_amd64.go:212] [ 1822(17045): 1822(17045)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:41.081195 711557 usertrap_amd64.go:122] [ 1822(17045): 1822(17045)] Allocate a new trap: 0xc015168180 42 D0706 16:21:41.081275 711557 usertrap_amd64.go:225] [ 1822(17045): 1822(17045)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:41.081415 711557 usertrap_amd64.go:212] [ 1825(17955): 1825(17955)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:41.081506 711557 usertrap_amd64.go:122] [ 1825(17955): 1825(17955)] Allocate a new trap: 0xc0151681b0 41 D0706 16:21:41.081593 711557 usertrap_amd64.go:225] [ 1825(17955): 1825(17955)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:41.086207 711557 usertrap_amd64.go:212] [ 1823(16473): 1823(16473)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:41.086274 711557 usertrap_amd64.go:122] [ 1823(16473): 1823(16473)] Allocate a new trap: 0xc0170608a0 42 D0706 16:21:41.086351 711557 usertrap_amd64.go:225] [ 1823(16473): 1823(16473)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:41.088429 711557 usertrap_amd64.go:212] [ 1822(17045): 1826(17046)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:41.088525 711557 usertrap_amd64.go:122] [ 1822(17045): 1826(17046)] Allocate a new trap: 0xc015168180 43 D0706 16:21:41.088711 711557 usertrap_amd64.go:225] [ 1822(17045): 1826(17046)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:41.093298 711557 usertrap_amd64.go:212] [ 1823(16473): 1823(16473)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:41.093360 711557 usertrap_amd64.go:122] [ 1823(16473): 1823(16473)] Allocate a new trap: 0xc0170608a0 43 D0706 16:21:41.093424 711557 usertrap_amd64.go:225] [ 1823(16473): 1823(16473)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:41.097648 711557 usertrap_amd64.go:212] [ 1822(17045): 1822(17045)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:41.097701 711557 usertrap_amd64.go:122] [ 1822(17045): 1822(17045)] Allocate a new trap: 0xc015168180 44 D0706 16:21:41.097818 711557 usertrap_amd64.go:225] [ 1822(17045): 1822(17045)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:41.101691 711557 task_exit.go:204] [ 1823(16473): 1823(16473)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.102020 711557 task_signals.go:204] [ 1823(16473): 1827(16474)] Signal 1823, PID: 1827, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.102221 711557 task_exit.go:204] [ 1823(16473): 1827(16474)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.102332 711557 task_exit.go:204] [ 1823(16473): 1823(16473)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.102659 711557 task_exit.go:204] [ 1822(17045): 1822(17045)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.102983 711557 task_exit.go:204] [ 1822(17045): 1822(17045)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.102957 711557 task_signals.go:204] [ 1822(17045): 1826(17046)] Signal 1822, PID: 1826, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.103203 711557 task_exit.go:204] [ 1822(17045): 1826(17046)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.109757 711557 usertrap_amd64.go:212] [ 1825(17955): 1825(17955)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:41.109828 711557 usertrap_amd64.go:122] [ 1825(17955): 1825(17955)] Allocate a new trap: 0xc0151681b0 42 D0706 16:21:41.109906 711557 usertrap_amd64.go:225] [ 1825(17955): 1825(17955)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:41.110569 711557 task_exit.go:204] [ 1822(17045): 1826(17046)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.110708 711557 task_exit.go:204] [ 1822(17045): 1826(17046)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.110798 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:41.110990 711557 task_exit.go:204] [ 1822(17045): 1822(17045)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:41 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:41.112893 711557 task_exit.go:204] [ 1823(16473): 1827(16474)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.113114 711557 task_exit.go:204] [ 1823(16473): 1827(16474)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.113292 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:41.113421 711557 task_exit.go:204] [ 1823(16473): 1823(16473)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.117546 711557 usertrap_amd64.go:212] [ 1825(17955): 1828(17956)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:41.117645 711557 usertrap_amd64.go:122] [ 1825(17955): 1828(17956)] Allocate a new trap: 0xc0151681b0 43 D0706 16:21:41.117784 711557 usertrap_amd64.go:225] [ 1825(17955): 1828(17956)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:41.138813 711557 usertrap_amd64.go:212] [ 1829(17047): 1829(17047)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:41.138942 711557 usertrap_amd64.go:122] [ 1829(17047): 1829(17047)] Allocate a new trap: 0xc017060900 40 D0706 16:21:41.139728 711557 usertrap_amd64.go:225] [ 1829(17047): 1829(17047)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:41.144236 711557 usertrap_amd64.go:212] [ 1825(17955): 1825(17955)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:41.144315 711557 usertrap_amd64.go:122] [ 1825(17955): 1825(17955)] Allocate a new trap: 0xc0151681b0 44 D0706 16:21:41.144419 711557 usertrap_amd64.go:225] [ 1825(17955): 1825(17955)] Apply the binary patch addr 5621be7600aa trap addr 67dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:41.144634 711557 usertrap_amd64.go:212] [ 1829(17047): 1829(17047)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:41.144690 711557 usertrap_amd64.go:122] [ 1829(17047): 1829(17047)] Allocate a new trap: 0xc017060900 41 D0706 16:21:41.144775 711557 usertrap_amd64.go:225] [ 1829(17047): 1829(17047)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:41.146639 711557 usertrap_amd64.go:212] [ 1825(17955): 1825(17955)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:41.146762 711557 usertrap_amd64.go:122] [ 1825(17955): 1825(17955)] Allocate a new trap: 0xc0151681b0 45 D0706 16:21:41.146875 711557 usertrap_amd64.go:225] [ 1825(17955): 1825(17955)] Apply the binary patch addr 5621be6ed124 trap addr 67e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 126 6 0]) D0706 16:21:41.151629 711557 task_exit.go:204] [ 1825(17955): 1825(17955)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.151855 711557 task_signals.go:204] [ 1825(17955): 1830(17957)] Signal 1825, PID: 1830, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.152004 711557 task_signals.go:204] [ 1825(17955): 1828(17956)] Signal 1825, PID: 1828, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.152037 711557 task_signals.go:204] [ 1825(17955): 1831(17958)] Signal 1825, PID: 1831, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.152109 711557 task_exit.go:204] [ 1825(17955): 1825(17955)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.152114 711557 task_signals.go:204] [ 1825(17955): 1833(17960)] Signal 1825, PID: 1833, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.152146 711557 task_signals.go:204] [ 1825(17955): 1832(17959)] Signal 1825, PID: 1832, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.152248 711557 task_exit.go:204] [ 1825(17955): 1833(17960)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.152782 711557 task_exit.go:204] [ 1825(17955): 1830(17957)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.153202 711557 task_exit.go:204] [ 1825(17955): 1833(17960)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.153297 711557 task_exit.go:204] [ 1825(17955): 1833(17960)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.153373 711557 task_exit.go:204] [ 1825(17955): 1828(17956)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.153462 711557 task_exit.go:204] [ 1825(17955): 1831(17958)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.153541 711557 task_exit.go:204] [ 1825(17955): 1832(17959)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.153641 711557 task_exit.go:204] [ 1825(17955): 1830(17957)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.153704 711557 task_exit.go:204] [ 1825(17955): 1830(17957)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.154112 711557 task_exit.go:204] [ 1825(17955): 1831(17958)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.154222 711557 task_exit.go:204] [ 1825(17955): 1831(17958)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.154537 711557 task_exit.go:204] [ 1825(17955): 1828(17956)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.154618 711557 task_exit.go:204] [ 1825(17955): 1828(17956)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.161558 711557 usertrap_amd64.go:212] [ 1829(17047): 1829(17047)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:41.161611 711557 usertrap_amd64.go:122] [ 1829(17047): 1829(17047)] Allocate a new trap: 0xc017060900 42 D0706 16:21:41.161660 711557 usertrap_amd64.go:225] [ 1829(17047): 1829(17047)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:41.164315 711557 task_exit.go:204] [ 1825(17955): 1832(17959)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.164394 711557 task_exit.go:204] [ 1825(17955): 1832(17959)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.164548 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:41.164727 711557 task_exit.go:204] [ 1825(17955): 1825(17955)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.176655 711557 usertrap_amd64.go:212] [ 1829(17047): 1834(17048)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:41.176734 711557 usertrap_amd64.go:122] [ 1829(17047): 1834(17048)] Allocate a new trap: 0xc017060900 43 D0706 16:21:41.176840 711557 usertrap_amd64.go:225] [ 1829(17047): 1834(17048)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:41.185455 711557 usertrap_amd64.go:212] [ 1829(17047): 1829(17047)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:41.185539 711557 usertrap_amd64.go:122] [ 1829(17047): 1829(17047)] Allocate a new trap: 0xc017060900 44 D0706 16:21:41.185619 711557 usertrap_amd64.go:225] [ 1829(17047): 1829(17047)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:41.187842 711557 task_exit.go:204] [ 1829(17047): 1829(17047)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.188083 711557 task_exit.go:204] [ 1829(17047): 1829(17047)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.188078 711557 task_signals.go:204] [ 1829(17047): 1834(17048)] Signal 1829, PID: 1834, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.188215 711557 task_exit.go:204] [ 1829(17047): 1834(17048)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.195293 711557 task_exit.go:204] [ 1829(17047): 1834(17048)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.195377 711557 task_exit.go:204] [ 1829(17047): 1834(17048)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.195529 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:41.196373 711557 task_exit.go:204] [ 1829(17047): 1829(17047)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.797432 711557 usertrap_amd64.go:212] [ 1816(15781): 1816(15781)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:41.797510 711557 usertrap_amd64.go:122] [ 1816(15781): 1816(15781)] Allocate a new trap: 0xc017060810 45 D0706 16:21:41.797580 711557 usertrap_amd64.go:225] [ 1816(15781): 1816(15781)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:41.799829 711557 task_exit.go:204] [ 1816(15781): 1816(15781)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.800030 711557 task_exit.go:204] [ 1816(15781): 1816(15781)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.800022 711557 task_signals.go:204] [ 1816(15781): 1818(15782)] Signal 1816, PID: 1818, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.800110 711557 task_signals.go:204] [ 1816(15781): 1824(15783)] Signal 1816, PID: 1824, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.800165 711557 task_exit.go:204] [ 1816(15781): 1818(15782)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.800249 711557 task_exit.go:204] [ 1816(15781): 1824(15783)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.800473 711557 task_exit.go:204] [ 1816(15781): 1824(15783)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.800535 711557 task_exit.go:204] [ 1816(15781): 1824(15783)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.808170 711557 task_exit.go:204] [ 1816(15781): 1818(15782)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.808263 711557 task_exit.go:204] [ 1816(15781): 1818(15782)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.808350 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:41.809456 711557 task_exit.go:204] [ 1816(15781): 1816(15781)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:41 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) r8 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:41 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/65, 0x41}, {&(0x7f0000000100)=""/93, 0x5d}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f0000000300)=""/158, 0x9e}], 0x5, &(0x7f0000000440)=""/80, 0x50}, 0x12062) recvmsg(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000600)=""/20, 0x14}, {&(0x7f0000000640)=""/223, 0xdf}, {&(0x7f0000000740)=""/187, 0xbb}], 0x4, &(0x7f0000000840)=""/4096, 0x1000}, 0x2202) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000001880)={0x8, 'dummy0\x00', {'veth0\x00'}, 0x4}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000018c0)='wg2\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000002f00)={'batadv0\x00', 0x0}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f0000001900)={0xa, 0x4e24, 0x2, @private1}, 0x1c, &(0x7f0000002e40)=[{&(0x7f0000001940)="8b3a580e17a484b9eddb6243fa5e3167ce3b60cd85cbd1d9bd1d39862e6175c34fd5446efc607631cfcbc304834e330e652fc29d328ea532b8838953e35dde068f64eb5c53fd99b4c6703ccf7bd20a2fb24bfb82f8e364948de719e685ec507a5879", 0x62}, {&(0x7f00000019c0)="a5c93e7c9a1dcc1f8127c40a9e6448db47988f52b49b33abe4a4098435ebeb2f188d8745cf4b535d742d886a700b1ecc1f6d33b648b1810e71fe5fe369130313e92b671541019c91cf1040f102adbb3fd3afbdd217ebe12c5f9acf351b66e7169ecfedfa3bbc53adb5deae969e37dba045e9d83c4f028a7735e4e2aa4bb8528dbbd69b26afb17ddcb23c00a62ed67f85a23dd1e8dff34c67a8ec92fd5f0b7b7a0e98b3df986bc66c19d73dd878929063a0d73b2487647a312d9e007184db411aee849c6f9ff308fbe9b28fc320bbae859936631004ee09479b194f1499ac4d52a0c56e3fbfae5a35", 0xe8}, {&(0x7f0000001ac0)="325f25a619c33acdc8ed9659dca5570a8857941c149ff0e43393259b3da177648156d0cf2a74bd53c9a75a1cc4aec129ec74f960448006f2f56b2c1ded394a849d18d6f6406e1228a2808ef3deb85bc8244bcedb75cfd842e1cc05cd02216e57c945a939c8832717e8c8a10a174469534394bf4bc03385b0dcc4a718ba04fb8910bb78c3b41d3018ea9e0713f1bb35a8ffbadecd0843bc66cd87a0c276baece7e46b3441b61f51c166bca36120fe74998c003390dd935f847bc241be612475cb82471a7e6905c1cd481d3d2371f3524310f575d3fc25c90beaa35b57e3b159ac2bda66756332e953c717f80776694e00b49f", 0xf2}, {&(0x7f0000001bc0)="a621b437157fa9c47e54b9e81975338210373ce4801ef79a371b7f2c8b6d3d4a9e7d28a92b3191b80d0d2545e9241ae7e678ad026d1953fdb265c639c6c5cc2fa0a58d1f8dabde6af8bc2658ae112befeab2bf757fbe107bcc40d9e988752af4d923d898de4f09c6e9e80d1420cdc7bfda636529fbb38bb9529cc7d0aa0c92df91c2a3b20694c08b3f0973f1a7dd9b9259c3d76578f852fd5e0e7f", 0x9b}, {&(0x7f0000001c80)="a8db42a576e735f264881e439f180ad8abec767673af7f09ae33751acf51f76f482ae187660267593531313f669c3abb73648d51319b67a36d1dfbf3abe7e92e301d38f2bb090571ebd94fa2e9e248d11519e6fd065bec2ed28cc89403f8e32df3313acd10027995d5b9b269f42f8b1ebcced97709942b61e752b0105218f494f0411bc317d54f478b117174f3f7be1bd0dd21daa1b00da563be570e7eaa212a3f096b82e84d", 0xa6}, {&(0x7f0000001d40)="3daf4129e6f5744a656604b6910e97f37a8347d1", 0x14}, {&(0x7f0000001d80)="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", 0x1000}, {0xfffffffffffffffe}, {&(0x7f0000002d80)="6b34a11e0c18c38cb02089daba6bfd76d352bf28671832a87dc885218545a667044226819983ec6bed89cd4a73d66dd3992de418e707aebffd347e335a24c89b84b5f1f6410cd49647769da89cb6bf45ce18550ad3b3810c9c874be6de0f073c423704c87bf7960ef05d9d34702dfeacfafb0c391547f8f1997183dad59a3e3ab822cf09cace86", 0x87}], 0x9, &(0x7f0000002f40)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x0, 0xa, 0x1, 0x8, 0x0, [@mcast2, @mcast1, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00', @mcast1]}}}, @dstopts={{0x28, 0x29, 0x37, {0x2f, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x100}, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0xffff}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r0}}}], 0x100}, 0x20008000) getpeername$inet6(0xffffffffffffffff, &(0x7f0000003080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000030c0)=0x1c) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000003100), &(0x7f0000003140)=0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000003180)={0x6, 0x1, 0xb75}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f00000033c0)={&(0x7f00000031c0)=@alg, 0x80, &(0x7f0000003380)=[{&(0x7f0000003240)=""/135, 0x87}, {&(0x7f0000003300)=""/92, 0x5c}], 0x2}, 0x41) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000003400)={0x2, 0x0, @initdev}, &(0x7f0000003440)=0x10, 0x80000) listen(r1, 0x8c1) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000003480), &(0x7f00000034c0)=0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000003500), &(0x7f0000003540)=0x30) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000003580)='io.weight\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000035c0)={0x29, @private=0xa010100, 0x4e24, 0x0, 'wlc\x00', 0x0, 0x7fffffff, 0x22}, 0x2c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000003600), 0x2080, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) r5 = open(&(0x7f0000003640)='./file0\x00', 0x300, 0x20) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000003680)={'broute\x00', 0x0, 0x0, 0x0, [0x3, 0xa457, 0x3, 0x7, 0x1, 0x1ec7]}, &(0x7f0000003700)=0x78) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000003740)) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000003780)='attr/fscreate\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x9, 0x4e22, 0x1000, 0xa, 0x80, 0xa0, 0x87, 0x0, 0xee01}, {0x3, 0x1, 0x6, 0x20, 0x53, 0x0, 0x6c2, 0x200}, {0x0, 0xff, 0x40, 0x2}, 0x7, 0x6e6bbf, 0x0, 0x1, 0x2, 0x2}, {{@in6=@private2, 0x4d3, 0x6c}, 0x2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3506, 0x1, 0x3, 0x9, 0x7a82, 0x6, 0x8}}, 0xe8) recvmsg(r5, &(0x7f0000003c40)={0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000038c0)=""/111, 0x6f}, {&(0x7f0000003940)=""/84, 0x54}, {&(0x7f00000039c0)=""/65, 0x41}, {&(0x7f0000003a40)=""/245, 0xf5}], 0x4, &(0x7f0000003b80)=""/167, 0xa7}, 0x0) dup2(r6, r3) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000003c80), 0x40002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000003cc0)={{{@in=@loopback, @in=@rand_addr=0x64010102, 0x4e21, 0x0, 0x4e21, 0x8, 0xa, 0x80, 0xa0, 0x73, r0, 0xee01}, {0x0, 0x8, 0x3922, 0x0, 0xfffffffffffffff9, 0x5, 0x2, 0x3}, {0x7, 0x80000001, 0x2892, 0x1}, 0x6, 0x6e6bb9, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x33}, 0x2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3507, 0x4, 0x0, 0x1f, 0x7f, 0x700, 0x1}}, 0xe8) connect$inet(r6, &(0x7f0000003dc0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000003e00)={0xa331663f19bb765d, @private=0xa010100, 0x4e24, 0x3, 'sh\x00', 0xc, 0xe92, 0x19}, 0x2c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000003f00)={0xffffffffffffffff, 0x2, 0x5, 0x5}) 16:21:41 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1054c2, 0x4a) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = socket$inet_icmp(0x2, 0x2, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r4 = dup3(r2, r3, 0x0) fcntl$dupfd(r1, 0x406, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') (async) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r6 = dup3(r1, r5, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000200)=""/103, 0x67}], 0x2, 0x0, 0x3) inotify_init() (async) inotify_init() setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) (async) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) close(r3) setrlimit(0x5, &(0x7f0000000100)={0x1, 0x7f}) (async) setrlimit(0x5, &(0x7f0000000100)={0x1, 0x7f}) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) getrlimit(0xd, &(0x7f0000000280)) setrlimit(0xd, &(0x7f00000000c0)={0xffff, 0x404}) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)) (async) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300), 0x82805, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, '&-*@'}}, {@access_any}, {@msize={'msize', 0x3d, 0xffffffffffffff53}}], [{@flag='mand'}, {@obj_type={'obj_type', 0x3d, 'limits\x00'}}, {@dont_appraise}, {@appraise_type}, {@smackfstransmute={'smackfstransmute', 0x3d, '(}\xe5]:'}}, {@uid_gt={'uid>', r7}}, {@seclabel}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'limits\x00'}}]}}) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) 16:21:41 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:41.839948 711557 usertrap_amd64.go:212] [ 1837(17049): 1837(17049)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:41.840061 711557 usertrap_amd64.go:122] [ 1837(17049): 1837(17049)] Allocate a new trap: 0xc1e5771e30 40 D0706 16:21:41.840736 711557 usertrap_amd64.go:225] [ 1837(17049): 1837(17049)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:41.843458 711557 usertrap_amd64.go:212] [ 1835(16475): 1835(16475)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:41.843658 711557 usertrap_amd64.go:122] [ 1835(16475): 1835(16475)] Allocate a new trap: 0xc000475920 40 D0706 16:21:41.844267 711557 usertrap_amd64.go:212] [ 1836(17961): 1836(17961)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:41.844365 711557 usertrap_amd64.go:122] [ 1836(17961): 1836(17961)] Allocate a new trap: 0xc00c6d2870 40 D0706 16:21:41.844725 711557 usertrap_amd64.go:225] [ 1835(16475): 1835(16475)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:41.845269 711557 usertrap_amd64.go:225] [ 1836(17961): 1836(17961)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:41.845853 711557 usertrap_amd64.go:212] [ 1837(17049): 1837(17049)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:41.845916 711557 usertrap_amd64.go:122] [ 1837(17049): 1837(17049)] Allocate a new trap: 0xc1e5771e30 41 D0706 16:21:41.846019 711557 usertrap_amd64.go:225] [ 1837(17049): 1837(17049)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:41.849882 711557 usertrap_amd64.go:212] [ 1838(15784): 1838(15784)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:41.849965 711557 usertrap_amd64.go:212] [ 1835(16475): 1835(16475)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:41.850032 711557 usertrap_amd64.go:122] [ 1838(15784): 1838(15784)] Allocate a new trap: 0xc1e5771e60 40 D0706 16:21:41.850058 711557 usertrap_amd64.go:122] [ 1835(16475): 1835(16475)] Allocate a new trap: 0xc000475920 41 D0706 16:21:41.850372 711557 usertrap_amd64.go:225] [ 1835(16475): 1835(16475)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:41.850928 711557 usertrap_amd64.go:225] [ 1838(15784): 1838(15784)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:41.857582 711557 usertrap_amd64.go:212] [ 1838(15784): 1838(15784)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:41.857801 711557 usertrap_amd64.go:122] [ 1838(15784): 1838(15784)] Allocate a new trap: 0xc1e5771e60 41 D0706 16:21:41.857882 711557 usertrap_amd64.go:225] [ 1838(15784): 1838(15784)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:41.866415 711557 usertrap_amd64.go:212] [ 1836(17961): 1836(17961)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:41.866499 711557 usertrap_amd64.go:122] [ 1836(17961): 1836(17961)] Allocate a new trap: 0xc00c6d2870 41 D0706 16:21:41.866577 711557 usertrap_amd64.go:225] [ 1836(17961): 1836(17961)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:41.867668 711557 usertrap_amd64.go:212] [ 1837(17049): 1837(17049)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:41.867738 711557 usertrap_amd64.go:122] [ 1837(17049): 1837(17049)] Allocate a new trap: 0xc1e5771e30 42 D0706 16:21:41.867800 711557 usertrap_amd64.go:225] [ 1837(17049): 1837(17049)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:41.875962 711557 usertrap_amd64.go:212] [ 1837(17049): 1839(17050)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:41.876059 711557 usertrap_amd64.go:122] [ 1837(17049): 1839(17050)] Allocate a new trap: 0xc1e5771e30 43 D0706 16:21:41.876127 711557 usertrap_amd64.go:225] [ 1837(17049): 1839(17050)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:41.882071 711557 usertrap_amd64.go:212] [ 1838(15784): 1838(15784)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:41.882153 711557 usertrap_amd64.go:122] [ 1838(15784): 1838(15784)] Allocate a new trap: 0xc1e5771e60 42 D0706 16:21:41.882214 711557 usertrap_amd64.go:225] [ 1838(15784): 1838(15784)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:41.884813 711557 usertrap_amd64.go:212] [ 1837(17049): 1837(17049)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:41.884887 711557 usertrap_amd64.go:122] [ 1837(17049): 1837(17049)] Allocate a new trap: 0xc1e5771e30 44 D0706 16:21:41.885070 711557 usertrap_amd64.go:225] [ 1837(17049): 1837(17049)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:41.888644 711557 usertrap_amd64.go:212] [ 1835(16475): 1835(16475)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:41.888764 711557 usertrap_amd64.go:122] [ 1835(16475): 1835(16475)] Allocate a new trap: 0xc000475920 42 D0706 16:21:41.888845 711557 usertrap_amd64.go:225] [ 1835(16475): 1835(16475)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:41.889552 711557 usertrap_amd64.go:212] [ 1836(17961): 1836(17961)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:41.889653 711557 usertrap_amd64.go:122] [ 1836(17961): 1836(17961)] Allocate a new trap: 0xc00c6d2870 42 D0706 16:21:41.889760 711557 usertrap_amd64.go:225] [ 1836(17961): 1836(17961)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:41.890218 711557 task_exit.go:204] [ 1837(17049): 1837(17049)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.890466 711557 task_signals.go:204] [ 1837(17049): 1839(17050)] Signal 1837, PID: 1839, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.890526 711557 task_exit.go:204] [ 1837(17049): 1837(17049)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.890617 711557 task_exit.go:204] [ 1837(17049): 1839(17050)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.895361 711557 usertrap_amd64.go:212] [ 1838(15784): 1840(15785)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:41.895558 711557 usertrap_amd64.go:122] [ 1838(15784): 1840(15785)] Allocate a new trap: 0xc1e5771e60 43 D0706 16:21:41.895671 711557 usertrap_amd64.go:225] [ 1838(15784): 1840(15785)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:41.898782 711557 usertrap_amd64.go:212] [ 1836(17961): 1842(17962)] Found the pattern at ip 5621be6ed3fd:sysno 257 D0706 16:21:41.898843 711557 usertrap_amd64.go:122] [ 1836(17961): 1842(17962)] Allocate a new trap: 0xc00c6d2870 43 D0706 16:21:41.898941 711557 usertrap_amd64.go:225] [ 1836(17961): 1842(17962)] Apply the binary patch addr 5621be6ed3fd trap addr 67d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:41.905020 711557 task_exit.go:204] [ 1837(17049): 1839(17050)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.905113 711557 task_exit.go:204] [ 1837(17049): 1839(17050)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.905214 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:41.905310 711557 usertrap_amd64.go:212] [ 1835(16475): 1841(16476)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:41.905366 711557 usertrap_amd64.go:122] [ 1835(16475): 1841(16476)] Allocate a new trap: 0xc000475920 43 D0706 16:21:41.905590 711557 usertrap_amd64.go:225] [ 1835(16475): 1841(16476)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:41.906527 711557 task_exit.go:204] [ 1837(17049): 1837(17049)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:41 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x2e, 0x4, 0x0, "9d35aa9e19386eb484cf2024b744a437", "2bdf434ffee042f2b90f7cdf82bf016ea29a82af07cf95f2be"}, 0x2e, 0x1) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:41.918941 711557 usertrap_amd64.go:212] [ 1835(16475): 1835(16475)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:41.919077 711557 usertrap_amd64.go:122] [ 1835(16475): 1835(16475)] Allocate a new trap: 0xc000475920 44 D0706 16:21:41.919273 711557 usertrap_amd64.go:225] [ 1835(16475): 1835(16475)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:41.921044 711557 task_exit.go:204] [ 1835(16475): 1835(16475)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.921328 711557 task_exit.go:204] [ 1835(16475): 1835(16475)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.921325 711557 task_signals.go:204] [ 1835(16475): 1841(16476)] Signal 1835, PID: 1841, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.921444 711557 task_exit.go:204] [ 1835(16475): 1841(16476)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.929408 711557 task_exit.go:204] [ 1835(16475): 1841(16476)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.929477 711557 task_exit.go:204] [ 1835(16475): 1841(16476)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.929594 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:41.930605 711557 task_exit.go:204] [ 1835(16475): 1835(16475)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:41 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/65, 0x41}, {&(0x7f0000000100)=""/93, 0x5d}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f0000000300)=""/158, 0x9e}], 0x5, &(0x7f0000000440)=""/80, 0x50}, 0x12062) (async) recvmsg(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000600)=""/20, 0x14}, {&(0x7f0000000640)=""/223, 0xdf}, {&(0x7f0000000740)=""/187, 0xbb}], 0x4, &(0x7f0000000840)=""/4096, 0x1000}, 0x2202) (async, rerun: 64) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000001880)={0x8, 'dummy0\x00', {'veth0\x00'}, 0x4}) (async, rerun: 64) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000018c0)='wg2\x00', 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000002f00)={'batadv0\x00', 0x0}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f0000001900)={0xa, 0x4e24, 0x2, @private1}, 0x1c, &(0x7f0000002e40)=[{&(0x7f0000001940)="8b3a580e17a484b9eddb6243fa5e3167ce3b60cd85cbd1d9bd1d39862e6175c34fd5446efc607631cfcbc304834e330e652fc29d328ea532b8838953e35dde068f64eb5c53fd99b4c6703ccf7bd20a2fb24bfb82f8e364948de719e685ec507a5879", 0x62}, {&(0x7f00000019c0)="a5c93e7c9a1dcc1f8127c40a9e6448db47988f52b49b33abe4a4098435ebeb2f188d8745cf4b535d742d886a700b1ecc1f6d33b648b1810e71fe5fe369130313e92b671541019c91cf1040f102adbb3fd3afbdd217ebe12c5f9acf351b66e7169ecfedfa3bbc53adb5deae969e37dba045e9d83c4f028a7735e4e2aa4bb8528dbbd69b26afb17ddcb23c00a62ed67f85a23dd1e8dff34c67a8ec92fd5f0b7b7a0e98b3df986bc66c19d73dd878929063a0d73b2487647a312d9e007184db411aee849c6f9ff308fbe9b28fc320bbae859936631004ee09479b194f1499ac4d52a0c56e3fbfae5a35", 0xe8}, {&(0x7f0000001ac0)="325f25a619c33acdc8ed9659dca5570a8857941c149ff0e43393259b3da177648156d0cf2a74bd53c9a75a1cc4aec129ec74f960448006f2f56b2c1ded394a849d18d6f6406e1228a2808ef3deb85bc8244bcedb75cfd842e1cc05cd02216e57c945a939c8832717e8c8a10a174469534394bf4bc03385b0dcc4a718ba04fb8910bb78c3b41d3018ea9e0713f1bb35a8ffbadecd0843bc66cd87a0c276baece7e46b3441b61f51c166bca36120fe74998c003390dd935f847bc241be612475cb82471a7e6905c1cd481d3d2371f3524310f575d3fc25c90beaa35b57e3b159ac2bda66756332e953c717f80776694e00b49f", 0xf2}, {&(0x7f0000001bc0)="a621b437157fa9c47e54b9e81975338210373ce4801ef79a371b7f2c8b6d3d4a9e7d28a92b3191b80d0d2545e9241ae7e678ad026d1953fdb265c639c6c5cc2fa0a58d1f8dabde6af8bc2658ae112befeab2bf757fbe107bcc40d9e988752af4d923d898de4f09c6e9e80d1420cdc7bfda636529fbb38bb9529cc7d0aa0c92df91c2a3b20694c08b3f0973f1a7dd9b9259c3d76578f852fd5e0e7f", 0x9b}, {&(0x7f0000001c80)="a8db42a576e735f264881e439f180ad8abec767673af7f09ae33751acf51f76f482ae187660267593531313f669c3abb73648d51319b67a36d1dfbf3abe7e92e301d38f2bb090571ebd94fa2e9e248d11519e6fd065bec2ed28cc89403f8e32df3313acd10027995d5b9b269f42f8b1ebcced97709942b61e752b0105218f494f0411bc317d54f478b117174f3f7be1bd0dd21daa1b00da563be570e7eaa212a3f096b82e84d", 0xa6}, {&(0x7f0000001d40)="3daf4129e6f5744a656604b6910e97f37a8347d1", 0x14}, {&(0x7f0000001d80)="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", 0x1000}, {0xfffffffffffffffe}, {&(0x7f0000002d80)="6b34a11e0c18c38cb02089daba6bfd76d352bf28671832a87dc885218545a667044226819983ec6bed89cd4a73d66dd3992de418e707aebffd347e335a24c89b84b5f1f6410cd49647769da89cb6bf45ce18550ad3b3810c9c874be6de0f073c423704c87bf7960ef05d9d34702dfeacfafb0c391547f8f1997183dad59a3e3ab822cf09cace86", 0x87}], 0x9, &(0x7f0000002f40)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x0, 0xa, 0x1, 0x8, 0x0, [@mcast2, @mcast1, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00', @mcast1]}}}, @dstopts={{0x28, 0x29, 0x37, {0x2f, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x100}, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0xffff}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r0}}}], 0x100}, 0x20008000) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000003080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000030c0)=0x1c) (async) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000003100), &(0x7f0000003140)=0x4) (async) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000003180)={0x6, 0x1, 0xb75}, 0xc) (async) recvmsg(0xffffffffffffffff, &(0x7f00000033c0)={&(0x7f00000031c0)=@alg, 0x80, &(0x7f0000003380)=[{&(0x7f0000003240)=""/135, 0x87}, {&(0x7f0000003300)=""/92, 0x5c}], 0x2}, 0x41) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000003400)={0x2, 0x0, @initdev}, &(0x7f0000003440)=0x10, 0x80000) listen(r1, 0x8c1) (async) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000003480), &(0x7f00000034c0)=0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000003500), &(0x7f0000003540)=0x30) (async) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000003580)='io.weight\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000035c0)={0x29, @private=0xa010100, 0x4e24, 0x0, 'wlc\x00', 0x0, 0x7fffffff, 0x22}, 0x2c) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000003600), 0x2080, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) (async, rerun: 32) r5 = open(&(0x7f0000003640)='./file0\x00', 0x300, 0x20) (rerun: 32) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000003680)={'broute\x00', 0x0, 0x0, 0x0, [0x3, 0xa457, 0x3, 0x7, 0x1, 0x1ec7]}, &(0x7f0000003700)=0x78) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000003740)) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000003780)='attr/fscreate\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x9, 0x4e22, 0x1000, 0xa, 0x80, 0xa0, 0x87, 0x0, 0xee01}, {0x3, 0x1, 0x6, 0x20, 0x53, 0x0, 0x6c2, 0x200}, {0x0, 0xff, 0x40, 0x2}, 0x7, 0x6e6bbf, 0x0, 0x1, 0x2, 0x2}, {{@in6=@private2, 0x4d3, 0x6c}, 0x2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3506, 0x1, 0x3, 0x9, 0x7a82, 0x6, 0x8}}, 0xe8) (async, rerun: 32) recvmsg(r5, &(0x7f0000003c40)={0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000038c0)=""/111, 0x6f}, {&(0x7f0000003940)=""/84, 0x54}, {&(0x7f00000039c0)=""/65, 0x41}, {&(0x7f0000003a40)=""/245, 0xf5}], 0x4, &(0x7f0000003b80)=""/167, 0xa7}, 0x0) (rerun: 32) dup2(r6, r3) (async) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000003c80), 0x40002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000003cc0)={{{@in=@loopback, @in=@rand_addr=0x64010102, 0x4e21, 0x0, 0x4e21, 0x8, 0xa, 0x80, 0xa0, 0x73, r0, 0xee01}, {0x0, 0x8, 0x3922, 0x0, 0xfffffffffffffff9, 0x5, 0x2, 0x3}, {0x7, 0x80000001, 0x2892, 0x1}, 0x6, 0x6e6bb9, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x33}, 0x2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3507, 0x4, 0x0, 0x1f, 0x7f, 0x700, 0x1}}, 0xe8) (async) connect$inet(r6, &(0x7f0000003dc0)={0x2, 0x4e20, @multicast1}, 0x10) (async) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000003e00)={0xa331663f19bb765d, @private=0xa010100, 0x4e24, 0x3, 'sh\x00', 0xc, 0xe92, 0x19}, 0x2c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000003f00)={0xffffffffffffffff, 0x2, 0x5, 0x5}) D0706 16:21:41.937893 711557 usertrap_amd64.go:212] [ 1836(17961): 1836(17961)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:41.937957 711557 usertrap_amd64.go:122] [ 1836(17961): 1836(17961)] Allocate a new trap: 0xc00c6d2870 44 D0706 16:21:41.938030 711557 usertrap_amd64.go:225] [ 1836(17961): 1836(17961)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:41.940925 711557 task_exit.go:204] [ 1836(17961): 1836(17961)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.941348 711557 task_signals.go:204] [ 1836(17961): 1844(17963)] Signal 1836, PID: 1844, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.941471 711557 task_signals.go:204] [ 1836(17961): 1842(17962)] Signal 1836, PID: 1842, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:41.941476 711557 task_exit.go:204] [ 1836(17961): 1844(17963)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.941747 711557 task_exit.go:204] [ 1836(17961): 1842(17962)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:41.941962 711557 task_exit.go:204] [ 1836(17961): 1842(17962)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.942013 711557 task_exit.go:204] [ 1836(17961): 1842(17962)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.942201 711557 task_exit.go:204] [ 1836(17961): 1836(17961)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.946200 711557 usertrap_amd64.go:212] [ 1843(17051): 1843(17051)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:41.946309 711557 usertrap_amd64.go:122] [ 1843(17051): 1843(17051)] Allocate a new trap: 0xc008510c30 40 D0706 16:21:41.947084 711557 usertrap_amd64.go:225] [ 1843(17051): 1843(17051)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:41.952602 711557 task_exit.go:204] [ 1836(17961): 1844(17963)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:41.952694 711557 task_exit.go:204] [ 1836(17961): 1844(17963)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:41.952970 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:41.953978 711557 usertrap_amd64.go:212] [ 1843(17051): 1843(17051)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:41.954030 711557 usertrap_amd64.go:122] [ 1843(17051): 1843(17051)] Allocate a new trap: 0xc008510c30 41 D0706 16:21:41.954095 711557 usertrap_amd64.go:225] [ 1843(17051): 1843(17051)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:41.954196 711557 task_exit.go:204] [ 1836(17961): 1836(17961)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:41 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x10000021d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:41.963213 711557 usertrap_amd64.go:212] [ 1838(15784): 1838(15784)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:41.963288 711557 usertrap_amd64.go:122] [ 1838(15784): 1838(15784)] Allocate a new trap: 0xc1e5771e60 44 D0706 16:21:41.963425 711557 usertrap_amd64.go:225] [ 1838(15784): 1838(15784)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:41.968000 711557 usertrap_amd64.go:212] [ 1845(16477): 1845(16477)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:41.968082 711557 usertrap_amd64.go:122] [ 1845(16477): 1845(16477)] Allocate a new trap: 0xc008919290 40 D0706 16:21:41.969028 711557 usertrap_amd64.go:225] [ 1845(16477): 1845(16477)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:41.971880 711557 usertrap_amd64.go:212] [ 1845(16477): 1845(16477)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:41.972002 711557 usertrap_amd64.go:122] [ 1845(16477): 1845(16477)] Allocate a new trap: 0xc008919290 41 D0706 16:21:41.972136 711557 usertrap_amd64.go:225] [ 1845(16477): 1845(16477)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:41.975837 711557 usertrap_amd64.go:212] [ 1843(17051): 1843(17051)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:41.975917 711557 usertrap_amd64.go:122] [ 1843(17051): 1843(17051)] Allocate a new trap: 0xc008510c30 42 D0706 16:21:41.976014 711557 usertrap_amd64.go:225] [ 1843(17051): 1843(17051)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:41.986300 711557 usertrap_amd64.go:212] [ 1847(17964): 1847(17964)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:41.986424 711557 usertrap_amd64.go:122] [ 1847(17964): 1847(17964)] Allocate a new trap: 0xc017060960 40 D0706 16:21:41.987103 711557 usertrap_amd64.go:212] [ 1843(17051): 1848(17052)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:41.987163 711557 usertrap_amd64.go:122] [ 1843(17051): 1848(17052)] Allocate a new trap: 0xc008510c30 43 D0706 16:21:41.987193 711557 usertrap_amd64.go:225] [ 1847(17964): 1847(17964)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:41.987333 711557 usertrap_amd64.go:225] [ 1843(17051): 1848(17052)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:41.990938 711557 usertrap_amd64.go:212] [ 1847(17964): 1847(17964)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:41.991030 711557 usertrap_amd64.go:122] [ 1847(17964): 1847(17964)] Allocate a new trap: 0xc017060960 41 D0706 16:21:41.991124 711557 usertrap_amd64.go:225] [ 1847(17964): 1847(17964)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:41.991601 711557 usertrap_amd64.go:212] [ 1845(16477): 1845(16477)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:41.991656 711557 usertrap_amd64.go:122] [ 1845(16477): 1845(16477)] Allocate a new trap: 0xc008919290 42 D0706 16:21:41.991702 711557 usertrap_amd64.go:225] [ 1845(16477): 1845(16477)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:41.999549 711557 usertrap_amd64.go:212] [ 1843(17051): 1843(17051)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:41.999613 711557 usertrap_amd64.go:122] [ 1843(17051): 1843(17051)] Allocate a new trap: 0xc008510c30 44 D0706 16:21:41.999676 711557 usertrap_amd64.go:225] [ 1843(17051): 1843(17051)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:42.002758 711557 task_exit.go:204] [ 1843(17051): 1843(17051)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.003183 711557 task_signals.go:204] [ 1843(17051): 1848(17052)] Signal 1843, PID: 1848, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.003292 711557 task_exit.go:204] [ 1843(17051): 1843(17051)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.003423 711557 task_exit.go:204] [ 1843(17051): 1848(17052)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.011728 711557 task_exit.go:204] [ 1843(17051): 1848(17052)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.011832 711557 task_exit.go:204] [ 1843(17051): 1848(17052)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.011905 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:42.012014 711557 task_exit.go:204] [ 1843(17051): 1843(17051)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:42 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:42.016745 711557 usertrap_amd64.go:212] [ 1847(17964): 1847(17964)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:42.016844 711557 usertrap_amd64.go:122] [ 1847(17964): 1847(17964)] Allocate a new trap: 0xc017060960 42 D0706 16:21:42.016993 711557 usertrap_amd64.go:225] [ 1847(17964): 1847(17964)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:42.021220 711557 usertrap_amd64.go:212] [ 1845(16477): 1849(16478)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:42.021343 711557 usertrap_amd64.go:122] [ 1845(16477): 1849(16478)] Allocate a new trap: 0xc008919290 43 D0706 16:21:42.021469 711557 usertrap_amd64.go:225] [ 1845(16477): 1849(16478)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:42.037755 711557 usertrap_amd64.go:212] [ 1845(16477): 1845(16477)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:42.037833 711557 usertrap_amd64.go:122] [ 1845(16477): 1845(16477)] Allocate a new trap: 0xc008919290 44 D0706 16:21:42.037944 711557 usertrap_amd64.go:225] [ 1845(16477): 1845(16477)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:42.042273 711557 task_exit.go:204] [ 1845(16477): 1845(16477)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.042487 711557 task_signals.go:204] [ 1845(16477): 1850(16479)] Signal 1845, PID: 1850, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.042551 711557 task_signals.go:204] [ 1845(16477): 1849(16478)] Signal 1845, PID: 1849, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.042611 711557 task_signals.go:204] [ 1845(16477): 1852(16481)] Signal 1845, PID: 1852, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.042792 711557 task_exit.go:204] [ 1845(16477): 1852(16481)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.042918 711557 task_signals.go:204] [ 1845(16477): 1851(16480)] Signal 1845, PID: 1851, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.043050 711557 task_exit.go:204] [ 1845(16477): 1851(16480)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.043257 711557 task_exit.go:204] [ 1845(16477): 1852(16481)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.043324 711557 task_exit.go:204] [ 1845(16477): 1852(16481)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.043488 711557 task_exit.go:204] [ 1845(16477): 1849(16478)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.043925 711557 task_exit.go:204] [ 1845(16477): 1849(16478)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.044103 711557 task_exit.go:204] [ 1845(16477): 1849(16478)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.044339 711557 task_exit.go:204] [ 1845(16477): 1850(16479)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.044562 711557 task_exit.go:204] [ 1845(16477): 1845(16477)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.045232 711557 task_exit.go:204] [ 1845(16477): 1850(16479)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.045386 711557 task_exit.go:204] [ 1845(16477): 1850(16479)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.055308 711557 usertrap_amd64.go:212] [ 1854(17053): 1854(17053)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:42.055424 711557 usertrap_amd64.go:122] [ 1854(17053): 1854(17053)] Allocate a new trap: 0xc00c6d28d0 40 D0706 16:21:42.055414 711557 task_exit.go:204] [ 1845(16477): 1851(16480)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.055505 711557 task_exit.go:204] [ 1845(16477): 1851(16480)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.055607 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:42.055763 711557 task_exit.go:204] [ 1845(16477): 1845(16477)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.056360 711557 usertrap_amd64.go:225] [ 1854(17053): 1854(17053)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:42.065468 711557 usertrap_amd64.go:212] [ 1854(17053): 1854(17053)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:42.065574 711557 usertrap_amd64.go:122] [ 1854(17053): 1854(17053)] Allocate a new trap: 0xc00c6d28d0 41 D0706 16:21:42.065711 711557 usertrap_amd64.go:225] [ 1854(17053): 1854(17053)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:42.079690 711557 usertrap_amd64.go:212] [ 1854(17053): 1854(17053)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:42.079747 711557 usertrap_amd64.go:122] [ 1854(17053): 1854(17053)] Allocate a new trap: 0xc00c6d28d0 42 D0706 16:21:42.079857 711557 usertrap_amd64.go:225] [ 1854(17053): 1854(17053)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:42.087267 711557 usertrap_amd64.go:212] [ 1854(17053): 1856(17054)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:42.087336 711557 usertrap_amd64.go:122] [ 1854(17053): 1856(17054)] Allocate a new trap: 0xc00c6d28d0 43 D0706 16:21:42.087430 711557 usertrap_amd64.go:225] [ 1854(17053): 1856(17054)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:42.146443 711557 usertrap_amd64.go:212] [ 1854(17053): 1854(17053)] Found the pattern at ip 55c7756a90aa:sysno 230 D0706 16:21:42.146526 711557 usertrap_amd64.go:122] [ 1854(17053): 1854(17053)] Allocate a new trap: 0xc00c6d28d0 44 D0706 16:21:42.146595 711557 usertrap_amd64.go:225] [ 1854(17053): 1854(17053)] Apply the binary patch addr 55c7756a90aa trap addr 60dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:42.185759 711557 usertrap_amd64.go:212] [ 1847(17964): 1847(17964)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:42.185847 711557 usertrap_amd64.go:122] [ 1847(17964): 1847(17964)] Allocate a new trap: 0xc017060960 43 D0706 16:21:42.185974 711557 usertrap_amd64.go:225] [ 1847(17964): 1847(17964)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:42.708703 711557 usertrap_amd64.go:212] [ 1838(15784): 1838(15784)] Found the pattern at ip 55ba5c95d124:sysno 3 D0706 16:21:42.709167 711557 usertrap_amd64.go:122] [ 1838(15784): 1838(15784)] Allocate a new trap: 0xc1e5771e60 45 D0706 16:21:42.709275 711557 usertrap_amd64.go:225] [ 1838(15784): 1838(15784)] Apply the binary patch addr 55ba5c95d124 trap addr 66e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 110 6 0]) D0706 16:21:42.711895 711557 task_exit.go:204] [ 1838(15784): 1838(15784)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.715265 711557 task_signals.go:204] [ 1838(15784): 1846(15786)] Signal 1838, PID: 1846, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.715620 711557 task_exit.go:204] [ 1838(15784): 1838(15784)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.715416 711557 task_signals.go:204] [ 1838(15784): 1840(15785)] Signal 1838, PID: 1840, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:42.716054 711557 task_exit.go:204] [ 1838(15784): 1846(15786)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.716482 711557 task_exit.go:204] [ 1838(15784): 1840(15785)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.716984 711557 task_exit.go:204] [ 1838(15784): 1840(15785)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.717110 711557 task_exit.go:204] [ 1838(15784): 1840(15785)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.733233 711557 task_exit.go:204] [ 1838(15784): 1846(15786)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.733443 711557 task_exit.go:204] [ 1838(15784): 1846(15786)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:42.733771 711557 task_signals.go:443] [ 44( 1): 44( 1)] Discarding ignored signal 17 D0706 16:21:42.734506 711557 task_exit.go:204] [ 1838(15784): 1838(15784)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:42 executing program 3: r0 = msgget(0x0, 0x2aa) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = shmat(r2, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmctl$IPC_SET(r0, 0xb, 0x0) r4 = semget(0x2, 0x2, 0x2c0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/34) semtimedop(r4, &(0x7f00000003c0)=[{0x4, 0x6, 0x1000}, {0x4, 0x7, 0x800}, {0x0, 0x0, 0x1000}, {0x1, 0x5, 0x2800}, {0x4, 0x6}], 0x5, &(0x7f0000000280)={0x0, 0x989680}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/8) shmctl$IPC_RMID(r0, 0x0) r5 = msgget$private(0x0, 0x38) shmctl$SHM_UNLOCK(r2, 0xc) r6 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmdt(0x0) msgsnd(0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES64=r6, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT], 0x0, 0x800) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') r8 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) dup2(r8, r8) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYRES16=r4, @ANYRES16=r7, @ANYRESOCT=r4, @ANYRES8], 0x0, 0x1, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/system', 0x0, 0x0) msgsnd(r4, &(0x7f0000000080)={0x2, "aa31ad2bb52879ed097771c33eaf08dbe7edc2231ed2039c4167d4ebf35790acfab50cc03073eacd8e3af40a250d17d8d3520b98934c3e8397a4d73e968e27071ed83bfc5634bdac22726837fe442a0af46334f28c7c2691eb3550a7ce8342164050b19664fa58"}, 0x6f, 0x0) close(r9) setsockopt$sock_timeval(r9, 0x1, 0x15, 0x0, 0x0) msgsnd(r5, &(0x7f0000000800)=ANY=[@ANYBLOB="0d835dbcd82d3106ecd6a4135f0e869fa166a0aa2c776481dc202ea4f61fa002912c76e5f366e3d20e28ba55ac908d9ce9d57df5655a8a468d1a90589d45079f3061215b96c107160b35bf82d78b85d92fae65edd1902ec9236264a5d22d0979bc24429bc591d82f70f469bf4c2f492bd5a894af7dcb0264c59dae", @ANYRES16, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r2, @ANYBLOB="fb1c4850d5c62cb0dffc3c28d65ffcfd2af7790eea9e87dface1df71b5721c4f0cc53d38721e822f14734cad9c4e11893e341210d19284929a4528fae41ca5828298a64aa800ad099681a30cdc5ca1a8e2", @ANYBLOB="8ea43f8f91622315f4a8d6a03a78d022cbf000197c09c6402516b65586900355f869553783592dcc4157d2f88f7669a48e4af68c23cd142b0f279174514d5d00fcc86fafde2b04561ec8dbd4cb4cf7c088669ff2fbaa90b6957f960183982ca768a3bc2f92b1d6947fc4adaa425305fda774425ab02572ecde7fb974379d2fa50892d708643551682eca3ab9dff840f3650b0c68a822834d0d6988a4f1b8f557a74a427912c09490e10b649de5fe0e8301d49201fb18e79a9afb9c9551750a372df1778763dd4420b7cbd4198ff0d87c921b0bcf0ba269426f9e79fc035c8c289bc2885a95c2b5f13f5c603de2", @ANYRESHEX=r0, @ANYRESHEX=r5], 0xfd, 0x800) shmdt(r3) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r11 = dup2(r10, r10) pwritev(r11, &(0x7f0000000200)=[{&(0x7f0000000180)="5d7d55f285457f0bca07dad4d68934218e3e1fdeae91486ee8c3cfa6615474734bf067fb0c2369f83f", 0x29}], 0x1, 0x1, 0x200) ioctl$FS_IOC_RESVSP(r10, 0x5421, &(0x7f0000000140)) 16:21:42 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/65, 0x41}, {&(0x7f0000000100)=""/93, 0x5d}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f0000000300)=""/158, 0x9e}], 0x5, &(0x7f0000000440)=""/80, 0x50}, 0x12062) (async) recvmsg(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000600)=""/20, 0x14}, {&(0x7f0000000640)=""/223, 0xdf}, {&(0x7f0000000740)=""/187, 0xbb}], 0x4, &(0x7f0000000840)=""/4096, 0x1000}, 0x2202) (async, rerun: 64) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000001880)={0x8, 'dummy0\x00', {'veth0\x00'}, 0x4}) (async, rerun: 64) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000018c0)='wg2\x00', 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000002f00)={'batadv0\x00', 0x0}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f0000001900)={0xa, 0x4e24, 0x2, @private1}, 0x1c, &(0x7f0000002e40)=[{&(0x7f0000001940)="8b3a580e17a484b9eddb6243fa5e3167ce3b60cd85cbd1d9bd1d39862e6175c34fd5446efc607631cfcbc304834e330e652fc29d328ea532b8838953e35dde068f64eb5c53fd99b4c6703ccf7bd20a2fb24bfb82f8e364948de719e685ec507a5879", 0x62}, {&(0x7f00000019c0)="a5c93e7c9a1dcc1f8127c40a9e6448db47988f52b49b33abe4a4098435ebeb2f188d8745cf4b535d742d886a700b1ecc1f6d33b648b1810e71fe5fe369130313e92b671541019c91cf1040f102adbb3fd3afbdd217ebe12c5f9acf351b66e7169ecfedfa3bbc53adb5deae969e37dba045e9d83c4f028a7735e4e2aa4bb8528dbbd69b26afb17ddcb23c00a62ed67f85a23dd1e8dff34c67a8ec92fd5f0b7b7a0e98b3df986bc66c19d73dd878929063a0d73b2487647a312d9e007184db411aee849c6f9ff308fbe9b28fc320bbae859936631004ee09479b194f1499ac4d52a0c56e3fbfae5a35", 0xe8}, {&(0x7f0000001ac0)="325f25a619c33acdc8ed9659dca5570a8857941c149ff0e43393259b3da177648156d0cf2a74bd53c9a75a1cc4aec129ec74f960448006f2f56b2c1ded394a849d18d6f6406e1228a2808ef3deb85bc8244bcedb75cfd842e1cc05cd02216e57c945a939c8832717e8c8a10a174469534394bf4bc03385b0dcc4a718ba04fb8910bb78c3b41d3018ea9e0713f1bb35a8ffbadecd0843bc66cd87a0c276baece7e46b3441b61f51c166bca36120fe74998c003390dd935f847bc241be612475cb82471a7e6905c1cd481d3d2371f3524310f575d3fc25c90beaa35b57e3b159ac2bda66756332e953c717f80776694e00b49f", 0xf2}, {&(0x7f0000001bc0)="a621b437157fa9c47e54b9e81975338210373ce4801ef79a371b7f2c8b6d3d4a9e7d28a92b3191b80d0d2545e9241ae7e678ad026d1953fdb265c639c6c5cc2fa0a58d1f8dabde6af8bc2658ae112befeab2bf757fbe107bcc40d9e988752af4d923d898de4f09c6e9e80d1420cdc7bfda636529fbb38bb9529cc7d0aa0c92df91c2a3b20694c08b3f0973f1a7dd9b9259c3d76578f852fd5e0e7f", 0x9b}, {&(0x7f0000001c80)="a8db42a576e735f264881e439f180ad8abec767673af7f09ae33751acf51f76f482ae187660267593531313f669c3abb73648d51319b67a36d1dfbf3abe7e92e301d38f2bb090571ebd94fa2e9e248d11519e6fd065bec2ed28cc89403f8e32df3313acd10027995d5b9b269f42f8b1ebcced97709942b61e752b0105218f494f0411bc317d54f478b117174f3f7be1bd0dd21daa1b00da563be570e7eaa212a3f096b82e84d", 0xa6}, {&(0x7f0000001d40)="3daf4129e6f5744a656604b6910e97f37a8347d1", 0x14}, {&(0x7f0000001d80)="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", 0x1000}, {0xfffffffffffffffe}, {&(0x7f0000002d80)="6b34a11e0c18c38cb02089daba6bfd76d352bf28671832a87dc885218545a667044226819983ec6bed89cd4a73d66dd3992de418e707aebffd347e335a24c89b84b5f1f6410cd49647769da89cb6bf45ce18550ad3b3810c9c874be6de0f073c423704c87bf7960ef05d9d34702dfeacfafb0c391547f8f1997183dad59a3e3ab822cf09cace86", 0x87}], 0x9, &(0x7f0000002f40)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x0, 0xa, 0x1, 0x8, 0x0, [@mcast2, @mcast1, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00', @mcast1]}}}, @dstopts={{0x28, 0x29, 0x37, {0x2f, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x100}, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @tclass={{0x14, 0x29, 0x43, 0xffff}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r0}}}], 0x100}, 0x20008000) (async) getpeername$inet6(0xffffffffffffffff, &(0x7f0000003080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000030c0)=0x1c) (async) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000003100), &(0x7f0000003140)=0x4) (async) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000003180)={0x6, 0x1, 0xb75}, 0xc) (async) recvmsg(0xffffffffffffffff, &(0x7f00000033c0)={&(0x7f00000031c0)=@alg, 0x80, &(0x7f0000003380)=[{&(0x7f0000003240)=""/135, 0x87}, {&(0x7f0000003300)=""/92, 0x5c}], 0x2}, 0x41) (async, rerun: 64) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000003400)={0x2, 0x0, @initdev}, &(0x7f0000003440)=0x10, 0x80000) (rerun: 64) listen(r1, 0x8c1) (async) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000003480), &(0x7f00000034c0)=0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000003500), &(0x7f0000003540)=0x30) (async) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000003580)='io.weight\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000035c0)={0x29, @private=0xa010100, 0x4e24, 0x0, 'wlc\x00', 0x0, 0x7fffffff, 0x22}, 0x2c) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000003600), 0x2080, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) (async) r5 = open(&(0x7f0000003640)='./file0\x00', 0x300, 0x20) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000003680)={'broute\x00', 0x0, 0x0, 0x0, [0x3, 0xa457, 0x3, 0x7, 0x1, 0x1ec7]}, &(0x7f0000003700)=0x78) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000003740)) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000003780)='attr/fscreate\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x9, 0x4e22, 0x1000, 0xa, 0x80, 0xa0, 0x87, 0x0, 0xee01}, {0x3, 0x1, 0x6, 0x20, 0x53, 0x0, 0x6c2, 0x200}, {0x0, 0xff, 0x40, 0x2}, 0x7, 0x6e6bbf, 0x0, 0x1, 0x2, 0x2}, {{@in6=@private2, 0x4d3, 0x6c}, 0x2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3506, 0x1, 0x3, 0x9, 0x7a82, 0x6, 0x8}}, 0xe8) recvmsg(r5, &(0x7f0000003c40)={0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000038c0)=""/111, 0x6f}, {&(0x7f0000003940)=""/84, 0x54}, {&(0x7f00000039c0)=""/65, 0x41}, {&(0x7f0000003a40)=""/245, 0xf5}], 0x4, &(0x7f0000003b80)=""/167, 0xa7}, 0x0) (async) dup2(r6, r3) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000003c80), 0x40002, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000003cc0)={{{@in=@loopback, @in=@rand_addr=0x64010102, 0x4e21, 0x0, 0x4e21, 0x8, 0xa, 0x80, 0xa0, 0x73, r0, 0xee01}, {0x0, 0x8, 0x3922, 0x0, 0xfffffffffffffff9, 0x5, 0x2, 0x3}, {0x7, 0x80000001, 0x2892, 0x1}, 0x6, 0x6e6bb9, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x33}, 0x2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3507, 0x4, 0x0, 0x1f, 0x7f, 0x700, 0x1}}, 0xe8) (async, rerun: 32) connect$inet(r6, &(0x7f0000003dc0)={0x2, 0x4e20, @multicast1}, 0x10) (rerun: 32) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000003e00)={0xa331663f19bb765d, @private=0xa010100, 0x4e24, 0x3, 'sh\x00', 0xc, 0xe92, 0x19}, 0x2c) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000003f00)={0xffffffffffffffff, 0x2, 0x5, 0x5}) D0706 16:21:42.834732 711557 usertrap_amd64.go:212] [ 1847(17964): 1847(17964)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:42.834942 711557 usertrap_amd64.go:122] [ 1847(17964): 1847(17964)] Allocate a new trap: 0xc017060960 44 D0706 16:21:42.835076 711557 usertrap_amd64.go:225] [ 1847(17964): 1847(17964)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:42.840456 711557 task_exit.go:204] [ 1847(17964): 1847(17964)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.841297 711557 task_exit.go:204] [ 1847(17964): 1847(17964)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:42.905666 711557 usertrap_amd64.go:212] [ 1854(17053): 1854(17053)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:42.905771 711557 usertrap_amd64.go:122] [ 1854(17053): 1854(17053)] Allocate a new trap: 0xc00c6d28d0 45 D0706 16:21:42.905881 711557 usertrap_amd64.go:225] [ 1854(17053): 1854(17053)] Apply the binary patch addr 55c775636124 trap addr 60e10 ([184 3 0 0 0 15 5] -> [255 36 37 16 14 6 0]) D0706 16:21:42.985262 711557 task_exit.go:204] [ 1854(17053): 1854(17053)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:42.986623 711557 task_exit.go:204] [ 1854(17053): 1854(17053)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:44.929060 711557 task_signals.go:204] [ 1854(17053): 1856(17054)] Signal 1854, PID: 1856, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:44.929126 711557 task_signals.go:204] [ 1847(17964): 1853(17965)] Signal 1847, PID: 1853, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:44.929248 711557 task_exit.go:204] [ 1854(17053): 1856(17054)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:44.929473 711557 task_signals.go:204] [ 1847(17964): 1857(17967)] Signal 1847, PID: 1857, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:44.929777 711557 task_signals.go:204] [ 1847(17964): 1855(17966)] Signal 1847, PID: 1855, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:44.930153 711557 task_exit.go:204] [ 1847(17964): 1855(17966)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:44.930401 711557 task_exit.go:204] [ 1847(17964): 1853(17965)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:44.930742 711557 task_exit.go:204] [ 1847(17964): 1855(17966)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:44.930850 711557 task_exit.go:204] [ 1847(17964): 1855(17966)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:44.931000 711557 task_exit.go:204] [ 1847(17964): 1857(17967)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:44.931431 711557 task_exit.go:204] [ 1847(17964): 1853(17965)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:44.931502 711557 task_exit.go:204] [ 1847(17964): 1853(17965)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:44.940639 711557 usertrap_amd64.go:212] [ 1858(16482): 1858(16482)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:44.940791 711557 usertrap_amd64.go:122] [ 1858(16482): 1858(16482)] Allocate a new trap: 0xc0004759b0 40 D0706 16:21:44.941759 711557 usertrap_amd64.go:225] [ 1858(16482): 1858(16482)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:44.945279 711557 usertrap_amd64.go:212] [ 1858(16482): 1858(16482)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:44.945348 711557 usertrap_amd64.go:122] [ 1858(16482): 1858(16482)] Allocate a new trap: 0xc0004759b0 41 D0706 16:21:44.945427 711557 usertrap_amd64.go:225] [ 1858(16482): 1858(16482)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:44.950724 711557 task_exit.go:204] [ 1847(17964): 1857(17967)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:44.950787 711557 task_exit.go:204] [ 1847(17964): 1857(17967)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:44.950932 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:44.951324 711557 task_exit.go:204] [ 1847(17964): 1847(17964)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:44 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) (async) fallocate(r0, 0x0, 0x0, 0x10000021d42a8a) (async) utime(&(0x7f0000000000)='./bus\x00', 0x0) (async) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:44.969278 711557 task_exit.go:204] [ 1854(17053): 1856(17054)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:44.969425 711557 task_exit.go:204] [ 1854(17053): 1856(17054)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:44.969665 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:44.969892 711557 task_exit.go:204] [ 1854(17053): 1854(17053)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:44 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:44.972270 711557 usertrap_amd64.go:212] [ 1858(16482): 1858(16482)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:44.972343 711557 usertrap_amd64.go:122] [ 1858(16482): 1858(16482)] Allocate a new trap: 0xc0004759b0 42 D0706 16:21:44.972454 711557 usertrap_amd64.go:225] [ 1858(16482): 1858(16482)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:44.979982 711557 usertrap_amd64.go:212] [ 1859(15787): 1859(15787)] Found the pattern at ip 55ba5c9d0720:sysno 109 D0706 16:21:44.980081 711557 usertrap_amd64.go:122] [ 1859(15787): 1859(15787)] Allocate a new trap: 0xc004a90090 40 D0706 16:21:44.981182 711557 usertrap_amd64.go:225] [ 1859(15787): 1859(15787)] Apply the binary patch addr 55ba5c9d0720 trap addr 66c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 108 6 0]) D0706 16:21:44.983401 711557 usertrap_amd64.go:212] [ 1860(17968): 1860(17968)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:44.983494 711557 usertrap_amd64.go:122] [ 1860(17968): 1860(17968)] Allocate a new trap: 0xc004a900c0 40 D0706 16:21:44.984241 711557 usertrap_amd64.go:225] [ 1860(17968): 1860(17968)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:44.986238 711557 usertrap_amd64.go:212] [ 1859(15787): 1859(15787)] Found the pattern at ip 55ba5c9aabb0:sysno 266 D0706 16:21:44.986332 711557 usertrap_amd64.go:122] [ 1859(15787): 1859(15787)] Allocate a new trap: 0xc004a90090 41 D0706 16:21:44.986402 711557 usertrap_amd64.go:225] [ 1859(15787): 1859(15787)] Apply the binary patch addr 55ba5c9aabb0 trap addr 66cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0706 16:21:44.990337 711557 usertrap_amd64.go:212] [ 1860(17968): 1860(17968)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:44.990942 711557 usertrap_amd64.go:122] [ 1860(17968): 1860(17968)] Allocate a new trap: 0xc004a900c0 41 D0706 16:21:44.991111 711557 usertrap_amd64.go:225] [ 1860(17968): 1860(17968)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:44.996605 711557 usertrap_amd64.go:212] [ 1858(16482): 1861(16483)] Found the pattern at ip 55bc30e113fd:sysno 257 D0706 16:21:44.996737 711557 usertrap_amd64.go:122] [ 1858(16482): 1861(16483)] Allocate a new trap: 0xc0004759b0 43 D0706 16:21:44.996840 711557 usertrap_amd64.go:225] [ 1858(16482): 1861(16483)] Apply the binary patch addr 55bc30e113fd trap addr 62d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:45.006306 711557 usertrap_amd64.go:212] [ 1858(16482): 1858(16482)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:45.006383 711557 usertrap_amd64.go:122] [ 1858(16482): 1858(16482)] Allocate a new trap: 0xc0004759b0 44 D0706 16:21:45.006450 711557 usertrap_amd64.go:225] [ 1858(16482): 1858(16482)] Apply the binary patch addr 55bc30e11124 trap addr 62dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 45 6 0]) D0706 16:21:45.007019 711557 usertrap_amd64.go:212] [ 1859(15787): 1859(15787)] Found the pattern at ip 55ba5c9ac7aa:sysno 56 D0706 16:21:45.007149 711557 usertrap_amd64.go:122] [ 1859(15787): 1859(15787)] Allocate a new trap: 0xc004a90090 42 D0706 16:21:45.007259 711557 usertrap_amd64.go:225] [ 1859(15787): 1859(15787)] Apply the binary patch addr 55ba5c9ac7aa trap addr 66d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0706 16:21:45.008735 711557 task_signals.go:204] [ 1858(16482): 1861(16483)] Signal 1858, PID: 1861, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.008755 711557 task_signals.go:204] [ 1858(16482): 1865(16487)] Signal 1858, PID: 1865, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.008779 711557 task_signals.go:204] [ 1858(16482): 1863(16485)] Signal 1858, PID: 1863, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.008814 711557 task_signals.go:204] [ 1858(16482): 1862(16484)] Signal 1858, PID: 1862, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.008834 711557 task_exit.go:204] [ 1858(16482): 1861(16483)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.008997 711557 task_exit.go:204] [ 1858(16482): 1858(16482)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.009352 711557 task_signals.go:204] [ 1858(16482): 1864(16486)] Signal 1858, PID: 1864, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.009506 711557 task_exit.go:204] [ 1858(16482): 1864(16486)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.009672 711557 task_exit.go:204] [ 1858(16482): 1865(16487)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.009897 711557 task_exit.go:204] [ 1858(16482): 1865(16487)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.009975 711557 task_exit.go:204] [ 1858(16482): 1865(16487)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.010178 711557 task_exit.go:204] [ 1858(16482): 1862(16484)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.010543 711557 task_exit.go:204] [ 1858(16482): 1861(16483)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.010622 711557 task_exit.go:204] [ 1858(16482): 1861(16483)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.010879 711557 task_exit.go:204] [ 1858(16482): 1858(16482)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.010993 711557 task_exit.go:204] [ 1858(16482): 1863(16485)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.011449 711557 task_exit.go:204] [ 1858(16482): 1862(16484)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.011616 711557 task_exit.go:204] [ 1858(16482): 1862(16484)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.011982 711557 task_exit.go:204] [ 1858(16482): 1864(16486)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.012044 711557 task_exit.go:204] [ 1858(16482): 1864(16486)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.017864 711557 usertrap_amd64.go:212] [ 1866(17055): 1866(17055)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:45.017957 711557 usertrap_amd64.go:122] [ 1866(17055): 1866(17055)] Allocate a new trap: 0xc01b066000 40 D0706 16:21:45.018842 711557 usertrap_amd64.go:225] [ 1866(17055): 1866(17055)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:45.021121 711557 usertrap_amd64.go:212] [ 1860(17968): 1860(17968)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:45.021208 711557 usertrap_amd64.go:122] [ 1860(17968): 1860(17968)] Allocate a new trap: 0xc004a900c0 42 D0706 16:21:45.021306 711557 usertrap_amd64.go:225] [ 1860(17968): 1860(17968)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) D0706 16:21:45.021735 711557 usertrap_amd64.go:212] [ 1859(15787): 1867(15788)] Found the pattern at ip 55ba5c95d3fd:sysno 257 D0706 16:21:45.021798 711557 usertrap_amd64.go:122] [ 1859(15787): 1867(15788)] Allocate a new trap: 0xc004a90090 43 D0706 16:21:45.021863 711557 usertrap_amd64.go:225] [ 1859(15787): 1867(15788)] Apply the binary patch addr 55ba5c95d3fd trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0706 16:21:45.022010 711557 task_exit.go:204] [ 1858(16482): 1863(16485)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.022101 711557 task_exit.go:204] [ 1858(16482): 1863(16485)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.022210 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:45.023033 711557 usertrap_amd64.go:212] [ 1866(17055): 1866(17055)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:45.023100 711557 usertrap_amd64.go:122] [ 1866(17055): 1866(17055)] Allocate a new trap: 0xc01b066000 41 D0706 16:21:45.023156 711557 usertrap_amd64.go:225] [ 1866(17055): 1866(17055)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:45.023321 711557 task_exit.go:204] [ 1858(16482): 1858(16482)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:45 executing program 1: r0 = timerfd_create(0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x5451, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x4]}, 0x8, 0x80000) r2 = accept4$inet(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) close(r2) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@empty, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, 0xfffffeff, 0x9, 0x49, 0x80, 0x7, 0x440010}) D0706 16:21:45.085583 711557 usertrap_amd64.go:212] [ 1860(17968): 1860(17968)] Found the pattern at ip 5621be7600aa:sysno 230 D0706 16:21:45.085688 711557 usertrap_amd64.go:122] [ 1860(17968): 1860(17968)] Allocate a new trap: 0xc004a900c0 43 D0706 16:21:45.085765 711557 usertrap_amd64.go:225] [ 1860(17968): 1860(17968)] Apply the binary patch addr 5621be7600aa trap addr 67d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 125 6 0]) D0706 16:21:45.087306 711557 usertrap_amd64.go:212] [ 1859(15787): 1859(15787)] Found the pattern at ip 55ba5c9d00aa:sysno 230 D0706 16:21:45.087376 711557 usertrap_amd64.go:122] [ 1859(15787): 1859(15787)] Allocate a new trap: 0xc004a90090 44 D0706 16:21:45.087467 711557 usertrap_amd64.go:225] [ 1859(15787): 1859(15787)] Apply the binary patch addr 55ba5c9d00aa trap addr 66dc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0706 16:21:45.110483 711557 usertrap_amd64.go:212] [ 1860(17968): 1860(17968)] Found the pattern at ip 5621be6ed124:sysno 3 D0706 16:21:45.110565 711557 usertrap_amd64.go:122] [ 1860(17968): 1860(17968)] Allocate a new trap: 0xc004a900c0 44 D0706 16:21:45.110635 711557 usertrap_amd64.go:225] [ 1860(17968): 1860(17968)] Apply the binary patch addr 5621be6ed124 trap addr 67dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 125 6 0]) D0706 16:21:45.113822 711557 task_exit.go:204] [ 1860(17968): 1860(17968)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.114174 711557 task_signals.go:204] [ 1860(17968): 1870(17971)] Signal 1860, PID: 1870, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.114222 711557 task_signals.go:204] [ 1860(17968): 1869(17970)] Signal 1860, PID: 1869, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.114192 711557 task_signals.go:204] [ 1860(17968): 1868(17969)] Signal 1860, PID: 1868, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.114346 711557 task_exit.go:204] [ 1860(17968): 1869(17970)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.114486 711557 task_exit.go:204] [ 1860(17968): 1868(17969)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.114608 711557 task_exit.go:204] [ 1860(17968): 1870(17971)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.115072 711557 task_exit.go:204] [ 1860(17968): 1870(17971)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.115132 711557 task_exit.go:204] [ 1860(17968): 1870(17971)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.115288 711557 task_exit.go:204] [ 1860(17968): 1860(17968)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.115636 711557 task_exit.go:204] [ 1860(17968): 1868(17969)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.115736 711557 task_exit.go:204] [ 1860(17968): 1868(17969)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.125122 711557 task_exit.go:204] [ 1860(17968): 1869(17970)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.125198 711557 task_exit.go:204] [ 1860(17968): 1869(17970)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.125276 711557 task_signals.go:443] [ 43( 1): 43( 1)] Discarding ignored signal 17 D0706 16:21:45.125519 711557 task_exit.go:204] [ 1860(17968): 1860(17968)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:45 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x105042, 0x0) setrlimit(0x1, &(0x7f0000000040)={0xfffffffffffffffc, 0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x10000021d42a8a) (async) fallocate(r0, 0x0, 0x0, 0x10000021d42a8a) utime(&(0x7f0000000000)='./bus\x00', 0x0) statx(r0, &(0x7f0000008480)='./bus\x00', 0x0, 0x0, 0x0) D0706 16:21:45.130263 711557 usertrap_amd64.go:212] [ 1866(17055): 1866(17055)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:45.130339 711557 usertrap_amd64.go:122] [ 1866(17055): 1866(17055)] Allocate a new trap: 0xc01b066000 42 D0706 16:21:45.130408 711557 usertrap_amd64.go:225] [ 1866(17055): 1866(17055)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:45.130411 711557 usertrap_amd64.go:212] [ 1872(16488): 1872(16488)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:45.130522 711557 usertrap_amd64.go:122] [ 1872(16488): 1872(16488)] Allocate a new trap: 0xc004a900f0 40 D0706 16:21:45.131296 711557 usertrap_amd64.go:225] [ 1872(16488): 1872(16488)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:45.135729 711557 usertrap_amd64.go:212] [ 1872(16488): 1872(16488)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:45.135791 711557 usertrap_amd64.go:122] [ 1872(16488): 1872(16488)] Allocate a new trap: 0xc004a900f0 41 D0706 16:21:45.135844 711557 usertrap_amd64.go:225] [ 1872(16488): 1872(16488)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:45.139281 711557 usertrap_amd64.go:212] [ 1866(17055): 1873(17056)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:45.139336 711557 usertrap_amd64.go:122] [ 1866(17055): 1873(17056)] Allocate a new trap: 0xc01b066000 43 D0706 16:21:45.139407 711557 usertrap_amd64.go:225] [ 1866(17055): 1873(17056)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:45.153235 711557 usertrap_amd64.go:212] [ 1866(17055): 1866(17055)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:45.153308 711557 usertrap_amd64.go:122] [ 1866(17055): 1866(17055)] Allocate a new trap: 0xc01b066000 44 D0706 16:21:45.153394 711557 usertrap_amd64.go:225] [ 1866(17055): 1866(17055)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:45.155457 711557 task_exit.go:204] [ 1866(17055): 1866(17055)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.155661 711557 task_signals.go:204] [ 1866(17055): 1873(17056)] Signal 1866, PID: 1873, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.155792 711557 task_exit.go:204] [ 1866(17055): 1873(17056)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.155999 711557 task_exit.go:204] [ 1866(17055): 1866(17055)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.162522 711557 usertrap_amd64.go:212] [ 1872(16488): 1872(16488)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:45.162579 711557 usertrap_amd64.go:122] [ 1872(16488): 1872(16488)] Allocate a new trap: 0xc004a900f0 42 D0706 16:21:45.162637 711557 usertrap_amd64.go:225] [ 1872(16488): 1872(16488)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:45.163490 711557 task_exit.go:204] [ 1866(17055): 1873(17056)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.163571 711557 task_exit.go:204] [ 1866(17055): 1873(17056)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.163682 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:45.164689 711557 task_exit.go:204] [ 1866(17055): 1866(17055)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:21:45 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x2f, 0x1, 0x80, "83529fe452ab85cb5102be39dc912509", "b56264259e6f0617b31f3ac34b7c30e866297df3946540e5c502"}, 0x2f, 0x3) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) clock_gettime(0x0, &(0x7f0000001cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000640)=@qipcrtr, 0x80, &(0x7f00000006c0)}, 0x2}, {{&(0x7f0000000700)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000880)=""/211, 0xd3}], 0x3, &(0x7f00000009c0)=""/228, 0xe4}, 0x9}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000ac0)=""/41, 0x29}], 0x1, &(0x7f0000000b40)=""/177, 0xb1}, 0x6}, {{&(0x7f0000000c00)=@x25, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/153, 0x99}, {&(0x7f0000000d40)=""/3, 0x3}], 0x2, &(0x7f0000000dc0)=""/222, 0xde}, 0x3f}, {{&(0x7f0000000ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f40)=""/121, 0x79}, {&(0x7f0000000fc0)=""/103, 0x67}, {&(0x7f0000001040)=""/185, 0xb9}, {&(0x7f0000001100)=""/129, 0x81}, {&(0x7f00000011c0)=""/9, 0x9}], 0x5}}, {{&(0x7f0000001280)=@hci, 0x80, &(0x7f0000001340)=[{&(0x7f0000001300)=""/55, 0x37}], 0x1, &(0x7f0000001380)=""/116, 0x74}, 0x10000}, {{&(0x7f0000001400), 0x80, &(0x7f0000001980)=[{&(0x7f0000001480)=""/227, 0xe3}, {&(0x7f0000001580)=""/137, 0x89}, {&(0x7f0000001640)=""/92, 0x5c}, {&(0x7f00000016c0)=""/73, 0x49}, {&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/165, 0xa5}, {&(0x7f0000001900)=""/108, 0x6c}], 0x7, &(0x7f0000001a00)=""/247, 0xf7}, 0x8}], 0x7, 0x10000, &(0x7f0000001d00)={r1, r2+10000000}) syz_open_procfs(0x0, &(0x7f0000001d40)='attr/keycreate\x00') ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f0000001d80)={0x1, 0x8}) lsetxattr$trusted_overlay_nlink(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80), &(0x7f0000001ec0)={'U+', 0x80}, 0x16, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000), &(0x7f0000007040), 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000007080)='mounts\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f00000070c0)={{0x0, 0x1000000000, 0x9, 0x200000, 0x6, 0xb51, 0x8, 0x0, 0x9974, 0xfffeffff, 0x3ff, 0x100000001, 0x7fff, 0x8001}}) getxattr(&(0x7f00000080c0)='./file0\x00', &(0x7f0000008100)=@random={'btrfs.', '\x00'}, &(0x7f0000008140)=""/88, 0x58) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000008200)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) creat(&(0x7f0000008300)='./file0\x00', 0xa1) D0706 16:21:45.166661 711557 usertrap_amd64.go:212] [ 1874(17972): 1874(17972)] Found the pattern at ip 5621be760720:sysno 109 D0706 16:21:45.166775 711557 usertrap_amd64.go:122] [ 1874(17972): 1874(17972)] Allocate a new trap: 0xc003908060 40 D0706 16:21:45.167769 711557 usertrap_amd64.go:225] [ 1874(17972): 1874(17972)] Apply the binary patch addr 5621be760720 trap addr 67c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 124 6 0]) D0706 16:21:45.171244 711557 usertrap_amd64.go:212] [ 1874(17972): 1874(17972)] Found the pattern at ip 5621be73abb0:sysno 266 D0706 16:21:45.171329 711557 usertrap_amd64.go:122] [ 1874(17972): 1874(17972)] Allocate a new trap: 0xc003908060 41 D0706 16:21:45.171389 711557 usertrap_amd64.go:225] [ 1874(17972): 1874(17972)] Apply the binary patch addr 5621be73abb0 trap addr 67cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 124 6 0]) D0706 16:21:45.179148 711557 usertrap_amd64.go:212] [ 1872(16488): 1872(16488)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:45.179243 711557 usertrap_amd64.go:122] [ 1872(16488): 1872(16488)] Allocate a new trap: 0xc004a900f0 43 D0706 16:21:45.179341 711557 usertrap_amd64.go:225] [ 1872(16488): 1872(16488)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:45.184339 711557 task_signals.go:204] [ 1872(16488): 1875(16489)] Signal 1872, PID: 1875, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.184451 711557 task_exit.go:204] [ 1872(16488): 1875(16489)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.184646 711557 task_exit.go:204] [ 1872(16488): 1875(16489)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.184711 711557 task_exit.go:204] [ 1872(16488): 1875(16489)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.184828 711557 task_exit.go:204] [ 1872(16488): 1872(16488)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.193094 711557 task_exit.go:204] [ 1872(16488): 1872(16488)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.193179 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:45.195166 711557 task_exit.go:204] [ 1872(16488): 1872(16488)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.195803 711557 usertrap_amd64.go:212] [ 1874(17972): 1874(17972)] Found the pattern at ip 5621be73c7aa:sysno 56 D0706 16:21:45.195911 711557 usertrap_amd64.go:122] [ 1874(17972): 1874(17972)] Allocate a new trap: 0xc003908060 42 D0706 16:21:45.195981 711557 usertrap_amd64.go:225] [ 1874(17972): 1874(17972)] Apply the binary patch addr 5621be73c7aa trap addr 67d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 125 6 0]) 16:21:45 executing program 1: r0 = timerfd_create(0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x5451, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x4]}, 0x8, 0x80000) r2 = accept4$inet(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) close(r2) (async) close(r2) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@empty, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, 0xfffffeff, 0x9, 0x49, 0x80, 0x7, 0x440010}) (async) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@empty, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, 0xfffffeff, 0x9, 0x49, 0x80, 0x7, 0x440010}) D0706 16:21:45.202312 711557 usertrap_amd64.go:212] [ 1876(17057): 1876(17057)] Found the pattern at ip 55c7756a9720:sysno 109 D0706 16:21:45.202392 711557 usertrap_amd64.go:122] [ 1876(17057): 1876(17057)] Allocate a new trap: 0xc003908090 40 D0706 16:21:45.203268 711557 usertrap_amd64.go:225] [ 1876(17057): 1876(17057)] Apply the binary patch addr 55c7756a9720 trap addr 60c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0706 16:21:45.207162 711557 usertrap_amd64.go:212] [ 1876(17057): 1876(17057)] Found the pattern at ip 55c775683bb0:sysno 266 D0706 16:21:45.207244 711557 usertrap_amd64.go:122] [ 1876(17057): 1876(17057)] Allocate a new trap: 0xc003908090 41 D0706 16:21:45.207314 711557 usertrap_amd64.go:225] [ 1876(17057): 1876(17057)] Apply the binary patch addr 55c775683bb0 trap addr 60cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0706 16:21:45.231451 711557 usertrap_amd64.go:212] [ 1879(16490): 1879(16490)] Found the pattern at ip 55bc30e84720:sysno 109 D0706 16:21:45.231548 711557 usertrap_amd64.go:122] [ 1879(16490): 1879(16490)] Allocate a new trap: 0xc2f1c5e030 40 D0706 16:21:45.232311 711557 usertrap_amd64.go:225] [ 1879(16490): 1879(16490)] Apply the binary patch addr 55bc30e84720 trap addr 62c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 44 6 0]) D0706 16:21:45.234657 711557 usertrap_amd64.go:212] [ 1876(17057): 1876(17057)] Found the pattern at ip 55c7756857aa:sysno 56 D0706 16:21:45.234742 711557 usertrap_amd64.go:122] [ 1876(17057): 1876(17057)] Allocate a new trap: 0xc003908090 42 D0706 16:21:45.234809 711557 usertrap_amd64.go:225] [ 1876(17057): 1876(17057)] Apply the binary patch addr 55c7756857aa trap addr 60d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0706 16:21:45.241075 711557 usertrap_amd64.go:212] [ 1879(16490): 1879(16490)] Found the pattern at ip 55bc30e5ebb0:sysno 266 D0706 16:21:45.241185 711557 usertrap_amd64.go:122] [ 1879(16490): 1879(16490)] Allocate a new trap: 0xc2f1c5e030 41 D0706 16:21:45.241342 711557 usertrap_amd64.go:225] [ 1879(16490): 1879(16490)] Apply the binary patch addr 55bc30e5ebb0 trap addr 62cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 44 6 0]) D0706 16:21:45.246189 711557 usertrap_amd64.go:212] [ 1876(17057): 1880(17058)] Found the pattern at ip 55c7756363fd:sysno 257 D0706 16:21:45.246270 711557 usertrap_amd64.go:122] [ 1876(17057): 1880(17058)] Allocate a new trap: 0xc003908090 43 D0706 16:21:45.246356 711557 usertrap_amd64.go:225] [ 1876(17057): 1880(17058)] Apply the binary patch addr 55c7756363fd trap addr 60d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 13 6 0]) D0706 16:21:45.258380 711557 usertrap_amd64.go:212] [ 1876(17057): 1876(17057)] Found the pattern at ip 55c775636124:sysno 3 D0706 16:21:45.258447 711557 usertrap_amd64.go:122] [ 1876(17057): 1876(17057)] Allocate a new trap: 0xc003908090 44 D0706 16:21:45.258523 711557 usertrap_amd64.go:225] [ 1876(17057): 1876(17057)] Apply the binary patch addr 55c775636124 trap addr 60dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 13 6 0]) D0706 16:21:45.262149 711557 usertrap_amd64.go:212] [ 1879(16490): 1879(16490)] Found the pattern at ip 55bc30e607aa:sysno 56 D0706 16:21:45.262214 711557 usertrap_amd64.go:122] [ 1879(16490): 1879(16490)] Allocate a new trap: 0xc2f1c5e030 42 D0706 16:21:45.262290 711557 usertrap_amd64.go:225] [ 1879(16490): 1879(16490)] Apply the binary patch addr 55bc30e607aa trap addr 62d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 45 6 0]) D0706 16:21:45.263099 711557 task_exit.go:204] [ 1876(17057): 1876(17057)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.263396 711557 task_exit.go:204] [ 1876(17057): 1876(17057)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.263628 711557 task_signals.go:204] [ 1876(17057): 1880(17058)] Signal 1876, PID: 1880, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.263976 711557 task_exit.go:204] [ 1876(17057): 1880(17058)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.272648 711557 task_exit.go:204] [ 1876(17057): 1880(17058)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.272809 711557 task_exit.go:204] [ 1876(17057): 1880(17058)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.273030 711557 task_signals.go:443] [ 42( 1): 42( 1)] Discarding ignored signal 17 D0706 16:21:45.273416 711557 task_exit.go:204] [ 1876(17057): 1876(17057)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.281123 711557 usertrap_amd64.go:212] [ 1879(16490): 1879(16490)] Found the pattern at ip 55bc30e11124:sysno 3 D0706 16:21:45.281296 711557 usertrap_amd64.go:122] [ 1879(16490): 1879(16490)] Allocate a new trap: 0xc2f1c5e030 43 D0706 16:21:45.281413 711557 usertrap_amd64.go:225] [ 1879(16490): 1879(16490)] Apply the binary patch addr 55bc30e11124 trap addr 62d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 45 6 0]) D0706 16:21:45.288294 711557 task_exit.go:204] [ 1879(16490): 1879(16490)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.288474 711557 task_signals.go:204] [ 1879(16490): 1883(16492)] Signal 1879, PID: 1883, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.288652 711557 task_signals.go:204] [ 1879(16490): 1881(16491)] Signal 1879, PID: 1881, TID: 0, fault addr: 0x9: terminating thread group D0706 16:21:45.288716 711557 task_exit.go:204] [ 1879(16490): 1883(16492)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.288900 711557 task_exit.go:204] [ 1879(16490): 1881(16491)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0706 16:21:45.289284 711557 task_exit.go:204] [ 1879(16490): 1883(16492)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.289429 711557 task_exit.go:204] [ 1879(16490): 1883(16492)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.289727 711557 task_exit.go:204] [ 1879(16490): 1879(16490)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.298242 711557 task_exit.go:204] [ 1879(16490): 1881(16491)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0706 16:21:45.298345 711557 task_exit.go:204] [ 1879(16490): 1881(16491)] Transitioning from exit state TaskExitZombie to TaskExitDead D0706 16:21:45.298448 711557 task_signals.go:443] [ 41( 1): 41( 1)] Discarding ignored signal 17 D0706 16:21:45.299929 711557 task_exit.go:204] [ 1879(16490): 1879(16490)] Transitioning from exit state TaskExitZombie to TaskExitDead ==711557==ERROR: ThreadSanitizer failed to allocate 0x8003000 (134230016) bytes at address 218085c41000 (errno: 12) W0706 16:21:45.962658 711700 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-race-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-race-1": urpc method "containerManager.WaitPID" failed: EOF W0706 16:21:45.963905 711700 main.go:274] Failure to execute command, err: 1 W0706 16:21:46.074524 711495 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-race-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0706 16:21:46.074408 1 connection.go:127] sock read failed, closing connection: EOF I0706 16:21:46.075889 1 gofer.go:319] All lisafs servers exited. I0706 16:21:46.075962 1 main.go:265] Exiting with status: 0 D0706 16:21:46.076740 711495 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-race-1 D0706 16:21:46.076926 711495 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-race-1 D0706 16:21:46.077010 711495 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-1 D0706 16:21:46.077061 711495 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-race-1" D0706 16:21:46.077169 711495 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-race-1, PID: 711556 D0706 16:21:46.095923 711495 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-race-1" I0706 16:21:46.097514 711495 main.go:265] Exiting with status: 16896 VM DIAGNOSIS: I0706 16:21:46.069631 771439 main.go:230] *************************** I0706 16:21:46.069790 771439 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0706 16:21:46.069905 771439 main.go:232] Version 0.0.0 I0706 16:21:46.069958 771439 main.go:233] GOOS: linux I0706 16:21:46.070022 771439 main.go:234] GOARCH: amd64 I0706 16:21:46.070068 771439 main.go:235] PID: 771439 I0706 16:21:46.070098 771439 main.go:236] UID: 0, GID: 0 I0706 16:21:46.070173 771439 main.go:237] Configuration: I0706 16:21:46.070253 771439 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0706 16:21:46.070313 771439 main.go:239] Platform: systrap I0706 16:21:46.070368 771439 main.go:240] FileAccess: shared I0706 16:21:46.070432 771439 main.go:241] Directfs: true I0706 16:21:46.070502 771439 main.go:242] Overlay: none I0706 16:21:46.070553 771439 main.go:243] Network: sandbox, logging: false I0706 16:21:46.070610 771439 main.go:244] Strace: false, max size: 1024, syscalls: I0706 16:21:46.070670 771439 main.go:245] IOURING: false I0706 16:21:46.070760 771439 main.go:246] Debug: true I0706 16:21:46.070814 771439 main.go:247] Systemd: false I0706 16:21:46.070893 771439 main.go:248] *************************** W0706 16:21:46.070954 771439 main.go:253] Block the TERM signal. This is only safe in tests! D0706 16:21:46.071118 771439 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0706 16:21:46.076368 771439 util.go:64] FATAL ERROR: container sandbox is not running container sandbox is not running W0706 16:21:46.076540 771439 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-1"]: exit status 128 I0706 16:21:46.069631 771439 main.go:230] *************************** I0706 16:21:46.069790 771439 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0706 16:21:46.069905 771439 main.go:232] Version 0.0.0 I0706 16:21:46.069958 771439 main.go:233] GOOS: linux I0706 16:21:46.070022 771439 main.go:234] GOARCH: amd64 I0706 16:21:46.070068 771439 main.go:235] PID: 771439 I0706 16:21:46.070098 771439 main.go:236] UID: 0, GID: 0 I0706 16:21:46.070173 771439 main.go:237] Configuration: I0706 16:21:46.070253 771439 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0706 16:21:46.070313 771439 main.go:239] Platform: systrap I0706 16:21:46.070368 771439 main.go:240] FileAccess: shared I0706 16:21:46.070432 771439 main.go:241] Directfs: true I0706 16:21:46.070502 771439 main.go:242] Overlay: none I0706 16:21:46.070553 771439 main.go:243] Network: sandbox, logging: false I0706 16:21:46.070610 771439 main.go:244] Strace: false, max size: 1024, syscalls: I0706 16:21:46.070670 771439 main.go:245] IOURING: false I0706 16:21:46.070760 771439 main.go:246] Debug: true I0706 16:21:46.070814 771439 main.go:247] Systemd: false I0706 16:21:46.070893 771439 main.go:248] *************************** W0706 16:21:46.070954 771439 main.go:253] Block the TERM signal. This is only safe in tests! D0706 16:21:46.071118 771439 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0706 16:21:46.076368 771439 util.go:64] FATAL ERROR: container sandbox is not running container sandbox is not running W0706 16:21:46.076540 771439 main.go:274] Failure to execute command, err: 1 [10883005.848092] exe[351220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611ed521686 cs:33 sp:7f4869318f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.158122] exe[351162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.266206] exe[346544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.377066] exe[339109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.504976] exe[350522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.596271] exe[338490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.679256] exe[351162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.771828] exe[341157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883031.870341] exe[338995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883032.012743] exe[342651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883032.113110] exe[341065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.195691] warn_bad_vsyscall: 220 callbacks suppressed [10883036.195694] exe[351306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.244871] exe[346525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d35f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.334812] exe[348876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d35f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.426255] exe[339104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.508118] exe[339176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.509573] exe[338995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.597072] exe[341150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d35f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.667071] exe[346441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.745047] exe[351216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883036.745491] exe[351227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.202056] warn_bad_vsyscall: 127 callbacks suppressed [10883041.202058] exe[340160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.281086] exe[349643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.371470] exe[347157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.456780] exe[339004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.538538] exe[351191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.649317] exe[347272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.735237] exe[349643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.768338] exe[346525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.836966] exe[331132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883041.913134] exe[347062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883046.696141] warn_bad_vsyscall: 140 callbacks suppressed [10883046.696143] exe[351327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883046.758901] exe[351327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883046.856518] exe[341065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883046.952645] exe[341065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883046.995471] exe[351275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883047.068373] exe[350507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10883047.157756] exe[351221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10883047.246762] exe[341150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10883047.323244] exe[330668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883047.413326] exe[347155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883051.735207] warn_bad_vsyscall: 199 callbacks suppressed [10883051.735211] exe[342741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [10883051.775906] exe[342741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [10883051.857229] exe[346499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [10883051.857988] exe[346500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200021c0 di:ffffffffff600000 [10883051.963422] exe[330649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883052.040826] exe[330565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883052.123913] exe[351191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883052.155800] exe[351191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883052.868494] exe[354106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883052.950471] exe[346525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883056.824600] warn_bad_vsyscall: 66 callbacks suppressed [10883056.824603] exe[346525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883056.943723] exe[351214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.049953] exe[347060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.098547] exe[341155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.189047] exe[351321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.256848] exe[350842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.286187] exe[350842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.389556] exe[347058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.426663] exe[338401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883057.557206] exe[338401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883061.961907] warn_bad_vsyscall: 175 callbacks suppressed [10883061.961910] exe[348876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883061.965413] exe[330581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfbc5ec686 cs:33 sp:7f030f1fef88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [10883062.019268] exe[339017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883062.068010] exe[341124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfbc5ec686 cs:33 sp:7f030f1fef88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883062.092123] exe[338401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883062.196191] exe[339041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883062.281571] exe[348876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883062.353552] exe[339053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d56f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883062.439752] exe[354104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883062.554311] exe[338472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e480acb686 cs:33 sp:7fe982d77f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883087.294153] warn_bad_vsyscall: 49 callbacks suppressed [10883087.294157] exe[355887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfbc59d3e8 cs:33 sp:7f030f1fef90 ax:7f030f1ff020 si:ffffffffff600000 di:55cfbc657019 [10883087.388547] exe[339674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfbc59d3e8 cs:33 sp:7f030f1ddf90 ax:7f030f1de020 si:ffffffffff600000 di:55cfbc657019 [10883087.489407] exe[355862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfbc59d3e8 cs:33 sp:7f030f1fef90 ax:7f030f1ff020 si:ffffffffff600000 di:55cfbc657019 [10883087.537038] exe[340292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfbc59d3e8 cs:33 sp:7f030f1bcf90 ax:7f030f1bd020 si:ffffffffff600000 di:55cfbc657019 [10883092.385959] exe[338891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.486124] exe[339006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.510080] exe[349308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.587478] exe[355965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.613963] exe[355965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.706760] exe[350889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.825115] exe[346191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.851000] exe[350870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.875448] exe[350870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883092.923103] exe[350870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883097.740636] warn_bad_vsyscall: 156 callbacks suppressed [10883097.740639] exe[341070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883097.771394] exe[355760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883097.822761] exe[355928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.628030] exe[355830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.692842] exe[356030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.693110] exe[355830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.819833] exe[339042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.846669] exe[349481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.919658] exe[355925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883098.988248] exe[346178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.031854] warn_bad_vsyscall: 58 callbacks suppressed [10883103.031857] exe[339125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.139864] exe[355925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.287078] exe[355932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.439083] exe[355822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.563011] exe[349030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.708451] exe[334458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.774968] exe[330761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.838830] exe[330796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.860157] exe[330796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883103.885179] exe[330796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.183422] warn_bad_vsyscall: 77 callbacks suppressed [10883108.183425] exe[339169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.271472] exe[338995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.315953] exe[338995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.386693] exe[334458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.573681] exe[339053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.686401] exe[349033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b12f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.791424] exe[349269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.867119] exe[347266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6ad0f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.919889] exe[355830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883108.996883] exe[341115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883113.561934] warn_bad_vsyscall: 23 callbacks suppressed [10883113.561937] exe[339041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883113.565048] exe[339195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883113.681090] exe[338995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883113.834095] exe[350861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883113.915228] exe[340175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883114.008408] exe[347260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883114.075313] exe[341081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883114.161825] exe[355963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b12f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883114.254549] exe[349031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b12f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883114.409959] exe[343132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883118.648782] warn_bad_vsyscall: 91 callbacks suppressed [10883118.648785] exe[350861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883118.768559] exe[338430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883118.856776] exe[350857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883118.925473] exe[346178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883118.958606] exe[341083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883119.050668] exe[330796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883119.116222] exe[338581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883119.206595] exe[334502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883119.296547] exe[334458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883119.384815] exe[355869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883123.669352] warn_bad_vsyscall: 121 callbacks suppressed [10883123.669355] exe[356341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883123.769068] exe[347284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883123.874129] exe[355836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.005656] exe[356336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.101973] exe[330749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.209333] exe[332918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.304680] exe[340172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.415296] exe[330796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.504841] exe[348200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883124.595785] exe[350867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883128.750779] warn_bad_vsyscall: 60 callbacks suppressed [10883128.750783] exe[343135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883128.879811] exe[355829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883128.974166] exe[341214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883128.999420] exe[350867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883129.106872] exe[346390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883129.181637] exe[349405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883129.209972] exe[346431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883129.326283] exe[349415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883129.463422] exe[347266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883129.552399] exe[349405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883133.788199] warn_bad_vsyscall: 31 callbacks suppressed [10883133.788202] exe[347291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10883133.945121] exe[346538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.042219] exe[349405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.074561] exe[350509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6af1f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.189708] exe[334502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.295646] exe[348935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.411697] exe[348924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.528853] exe[349415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b33f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.630876] exe[347299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883134.707176] exe[348200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a696e52686 cs:33 sp:7f84f6b54f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883341.549922] warn_bad_vsyscall: 79 callbacks suppressed [10883341.549926] exe[354087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515a6f2686 cs:33 sp:7ed156422f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883341.906164] exe[355692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef5b23a686 cs:33 sp:7ea8ef173f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883342.165690] exe[335526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f20246c686 cs:33 sp:7efde27dff88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883342.238875] exe[296633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfabc5b686 cs:33 sp:7f3e59e85f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883342.285428] exe[359041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e5415a686 cs:33 sp:7fbf6aae4f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883344.961781] exe[358392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607879c0686 cs:33 sp:7ec59ec75f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883347.349884] exe[326902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f20246c686 cs:33 sp:7efde27dff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883348.531324] exe[348465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607879c0686 cs:33 sp:7ec59ec75f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883352.724242] exe[356755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55879ef08686 cs:33 sp:7fd91b849f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883354.376227] exe[358417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55879ef08686 cs:33 sp:7fd91b849f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883356.236100] exe[358840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df03e47686 cs:33 sp:7ea156f7ef88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883359.567187] exe[287554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f42d0a686 cs:33 sp:7fac3177df88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883362.149707] exe[358231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df03e47686 cs:33 sp:7ea156f7ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883377.240096] exe[328462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f42d0a686 cs:33 sp:7fac3177df88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883451.127342] exe[345832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c4e0c9686 cs:33 sp:7eefb13fef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883476.374857] exe[361603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f40b399686 cs:33 sp:7f93917e7f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883478.429663] exe[361607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ecc59686 cs:33 sp:7fe0147baf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883512.415292] exe[305740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558957804686 cs:33 sp:7ebaa0525f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883533.401676] exe[315920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a02873686 cs:33 sp:7f56f2799f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883559.135145] exe[306459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a02873686 cs:33 sp:7f56f2799f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883770.101826] exe[362040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad99471686 cs:33 sp:7f50637a6f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883770.338013] exe[360419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad99471686 cs:33 sp:7f50637a6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883781.777752] exe[364854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b76b0f9686 cs:33 sp:7fa3ab3f8f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883781.860239] exe[310151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f7192a686 cs:33 sp:7f997f4d6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883877.183714] exe[348429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c318e0686 cs:33 sp:7f405e9d8f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883878.148237] exe[348429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c318e0686 cs:33 sp:7f405e9d8f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10883937.115452] exe[335200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559550407686 cs:33 sp:7fac3635cf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10883938.791035] exe[355395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dad4340686 cs:33 sp:7f0d7d94bf88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10885491.597726] exe[396896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7aac686 cs:33 sp:7ef06b48ef88 ax:ffffffffff600000 si:20002500 di:ffffffffff600000 [10885491.679535] exe[398558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7aac686 cs:33 sp:7ef06b46df88 ax:ffffffffff600000 si:20002500 di:ffffffffff600000 [10885491.717824] exe[396056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7aac686 cs:33 sp:7ef06b48ef88 ax:ffffffffff600000 si:20002500 di:ffffffffff600000 [10886398.680184] exe[430702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563413bd5686 cs:33 sp:7f88076678e8 ax:ffffffffff600000 si:7f8807667e08 di:ffffffffff600000 [10886399.508319] exe[419382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563413bd5686 cs:33 sp:7f88076888e8 ax:ffffffffff600000 si:7f8807688e08 di:ffffffffff600000 [10886400.412010] exe[408670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563413bd5686 cs:33 sp:7f88076678e8 ax:ffffffffff600000 si:7f8807667e08 di:ffffffffff600000 [10886495.466870] exe[396272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7a5d3e8 cs:33 sp:7ef06b48ef90 ax:7ef06b48f020 si:ffffffffff600000 di:564de7b17019 [10886495.512856] exe[432061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7a5d3e8 cs:33 sp:7ef06b48ef90 ax:7ef06b48f020 si:ffffffffff600000 di:564de7b17019 [10886495.535292] exe[396269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7a5d3e8 cs:33 sp:7ef06b48ef90 ax:7ef06b48f020 si:ffffffffff600000 di:564de7b17019 [10886495.591258] exe[396272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564de7a5d3e8 cs:33 sp:7ef06b48ef90 ax:7ef06b48f020 si:ffffffffff600000 di:564de7b17019 [10887296.931383] exe[445891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f49fec686 cs:33 sp:7f191304d8e8 ax:ffffffffff600000 si:7f191304de08 di:ffffffffff600000 [10887296.995901] exe[445842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f49fec686 cs:33 sp:7f191304d8e8 ax:ffffffffff600000 si:7f191304de08 di:ffffffffff600000 [10887297.107444] exe[389995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f49fec686 cs:33 sp:7f191304d8e8 ax:ffffffffff600000 si:7f191304de08 di:ffffffffff600000 [10888145.492932] exe[485370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e56b19686 cs:33 sp:7fdb14e85f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10888145.574338] exe[481789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e56b19686 cs:33 sp:7fdb14e85f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10888145.578042] exe[481879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e56b19686 cs:33 sp:7fdb14e64f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10888146.348011] exe[481947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e56b19686 cs:33 sp:7fdb14e85f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10889041.634385] exe[510901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55703f188686 cs:33 sp:7fd422a698e8 ax:ffffffffff600000 si:7fd422a69e08 di:ffffffffff600000 [10889041.835022] exe[509342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55703f188686 cs:33 sp:7fd422a698e8 ax:ffffffffff600000 si:7fd422a69e08 di:ffffffffff600000 [10889041.955102] exe[521078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55703f188686 cs:33 sp:7fd422a698e8 ax:ffffffffff600000 si:7fd422a69e08 di:ffffffffff600000 [10889398.768420] exe[489673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630cb195686 cs:33 sp:7ec79e9ad8e8 ax:ffffffffff600000 si:7ec79e9ade08 di:ffffffffff600000 [10889398.899161] exe[500505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630cb195686 cs:33 sp:7ec79e98c8e8 ax:ffffffffff600000 si:7ec79e98ce08 di:ffffffffff600000 [10889399.181046] exe[489666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630cb195686 cs:33 sp:7ec79e9ad8e8 ax:ffffffffff600000 si:7ec79e9ade08 di:ffffffffff600000 [10889399.183683] exe[494838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630cb195686 cs:33 sp:7ec79e98c8e8 ax:ffffffffff600000 si:7ec79e98ce08 di:ffffffffff600000 [10889925.189808] exe[476955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b9c3c5686 cs:33 sp:7f9800d7bf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889927.654827] exe[359563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c318e0686 cs:33 sp:7f405e9d8f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889929.984002] exe[472821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c55cc8a686 cs:33 sp:7f23fa17ff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889931.927778] exe[524397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df03e47686 cs:33 sp:7ea156f7ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889935.196688] exe[480343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e28d1b7686 cs:33 sp:7f3412d79f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889937.069220] exe[530146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6db993686 cs:33 sp:7ec8441fef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889943.264516] exe[511337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a29b65c686 cs:33 sp:7eee34e85f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889949.580997] exe[509556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0438e1686 cs:33 sp:7fc9b75fef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889950.610100] exe[477017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7fbc43686 cs:33 sp:7f6040240f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889952.906096] exe[531980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ba311a686 cs:33 sp:7f76682d3f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889953.527201] exe[503898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8ba641686 cs:33 sp:7f7569f1bf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889956.102116] exe[528649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555da3d44686 cs:33 sp:7ec23e040f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10889985.337535] exe[499057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fe3011686 cs:33 sp:7f69a05a1f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10890129.078043] exe[494589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc08267686 cs:33 sp:7f54d413cf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10892165.558819] exe[583537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582eb3243e8 cs:33 sp:7f15edb34f90 ax:7f15edb35020 si:ffffffffff600000 di:5582eb3de019 [10892166.450773] exe[587703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582eb3243e8 cs:33 sp:7f15edb13f90 ax:7f15edb14020 si:ffffffffff600000 di:5582eb3de019 [10892166.597390] exe[592312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582eb3243e8 cs:33 sp:7f15edb13f90 ax:7f15edb14020 si:ffffffffff600000 di:5582eb3de019 [10892233.470814] exe[579557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892234.342695] exe[582856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892235.222000] exe[579602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892246.367747] exe[579547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892247.241052] exe[594709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892248.124831] exe[579611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892249.002179] exe[579590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892249.874975] exe[579581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892249.982558] exe[579653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892250.090112] exe[584436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892250.184940] exe[579633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892250.266533] exe[579981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892250.350384] exe[584433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeb147c686 cs:33 sp:7f5cb0a978e8 ax:ffffffffff600000 si:7f5cb0a97e08 di:ffffffffff600000 [10892663.932916] warn_bad_vsyscall: 7 callbacks suppressed [10892663.932919] exe[608554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a806fe686 cs:33 sp:7f86e98278e8 ax:ffffffffff600000 si:7f86e9827e08 di:ffffffffff600000 [10892664.755412] exe[580107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a806fe686 cs:33 sp:7f86e98278e8 ax:ffffffffff600000 si:7f86e9827e08 di:ffffffffff600000 [10892664.757955] exe[579567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a806fe686 cs:33 sp:7f86e93fe8e8 ax:ffffffffff600000 si:7f86e93fee08 di:ffffffffff600000 [10892664.861354] exe[579978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a806fe686 cs:33 sp:7f86e98278e8 ax:ffffffffff600000 si:7f86e9827e08 di:ffffffffff600000 [10892664.895553] exe[579645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a806fe686 cs:33 sp:7f86e98278e8 ax:ffffffffff600000 si:7f86e9827e08 di:ffffffffff600000 [10893952.478523] exe[594150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a117462686 cs:33 sp:7f9cbba3b8e8 ax:ffffffffff600000 si:7f9cbba3be08 di:ffffffffff600000 [10893952.595475] exe[637292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a117462686 cs:33 sp:7f9cbba3b8e8 ax:ffffffffff600000 si:7f9cbba3be08 di:ffffffffff600000 [10893952.734639] exe[588600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a117462686 cs:33 sp:7f9cbb5fe8e8 ax:ffffffffff600000 si:7f9cbb5fee08 di:ffffffffff600000 [10893952.844105] exe[573692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a79d1cc686 cs:33 sp:7f1ef23fe8e8 ax:ffffffffff600000 si:7f1ef23fee08 di:ffffffffff600000 [10893952.965330] exe[637478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a79d1cc686 cs:33 sp:7f1ef23fe8e8 ax:ffffffffff600000 si:7f1ef23fee08 di:ffffffffff600000 [10894316.434957] exe[603335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d2cf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.618671] exe[623228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.647247] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.680600] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.708651] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.739720] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.768188] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.796430] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.825704] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894316.854720] exe[623320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559395972686 cs:33 sp:7fa202d0bf88 ax:ffffffffff600000 si:20002bc0 di:ffffffffff600000 [10894874.942257] warn_bad_vsyscall: 57 callbacks suppressed [10894874.942260] exe[615388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e45a2d63e8 cs:33 sp:7ed0f35d7f90 ax:7ed0f35d8020 si:ffffffffff600000 di:55e45a390019 [10894875.002710] exe[624151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e45a2d63e8 cs:33 sp:7ed0f35d7f90 ax:7ed0f35d8020 si:ffffffffff600000 di:55e45a390019 [10894875.056656] exe[623046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e45a2d63e8 cs:33 sp:7ed0f35d7f90 ax:7ed0f35d8020 si:ffffffffff600000 di:55e45a390019 [10895179.007236] exe[655818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef8a8d73e8 cs:33 sp:7f2e72f35f90 ax:7f2e72f36020 si:ffffffffff600000 di:55ef8a991019 [10896096.011473] exe[678553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.110261] exe[662744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.204511] exe[648839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.229077] exe[648562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.251508] exe[648562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.276987] exe[648719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.298743] exe[648719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.322257] exe[648719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.348267] exe[648839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10896096.370153] exe[648839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f37ff686 cs:33 sp:7fccccdaef88 ax:ffffffffff600000 si:20000400 di:ffffffffff600000 [10898213.671753] warn_bad_vsyscall: 25 callbacks suppressed [10898213.671756] exe[789869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1cb914686 cs:33 sp:7ec5e0592f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10898213.732396] exe[789075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1cb914686 cs:33 sp:7ec5e0592f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10898214.547847] exe[789872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1cb914686 cs:33 sp:7ec5e0592f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10898386.707975] exe[800753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a514c26686 cs:33 sp:7ee8f9ff6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10898386.760139] exe[801319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a514c26686 cs:33 sp:7ee8f9ff6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10898386.802437] exe[801319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a514c26686 cs:33 sp:7ee8f9ff6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10898493.437533] exe[781752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac52aa4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000 [10898493.505271] exe[789259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac52aa4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000 [10898493.556626] exe[789250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac52aa4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000 [10899820.132001] exe[835332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573aff00686 cs:33 sp:7eb866e2a8e8 ax:ffffffffff600000 si:7eb866e2ae08 di:ffffffffff600000 [10899820.196450] exe[835332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573aff00686 cs:33 sp:7eb8661fe8e8 ax:ffffffffff600000 si:7eb8661fee08 di:ffffffffff600000 [10899820.253723] exe[828024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573aff00686 cs:33 sp:7eb8661fe8e8 ax:ffffffffff600000 si:7eb8661fee08 di:ffffffffff600000 [10899820.274365] exe[827147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573aff00686 cs:33 sp:7eb8661fe8e8 ax:ffffffffff600000 si:7eb8661fee08 di:ffffffffff600000 [10899820.295529] exe[827992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573aff00686 cs:33 sp:7eb8661fe8e8 ax:ffffffffff600000 si:7eb8661fee08 di:ffffffffff600000 [10900989.885837] host.test[873158] bad frame in rt_sigreturn frame:00000000fcda1e47 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [10901297.993758] exe[920806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55edce9bddc9 cs:33 sp:7f50713ee598 ax:8 si:1 di:7f50713ee660 [10901298.047951] exe[920239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55edce9bddc9 cs:33 sp:7f50713ee598 ax:8 si:1 di:7f50713ee660 [10901298.098889] exe[933678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55edce9bddc9 cs:33 sp:7f50713ee598 ax:8 si:1 di:7f50713ee660 [10903112.907026] exe[979565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f999552dc9 cs:33 sp:7edb7009b598 ax:8 si:1 di:7edb7009b660 [10903112.957594] exe[979565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f999552dc9 cs:33 sp:7edb7009b598 ax:8 si:1 di:7edb7009b660 [10903112.998880] exe[979565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f999552dc9 cs:33 sp:7edb7009b598 ax:8 si:1 di:7edb7009b660 [10903311.968097] exe[956858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10903312.039054] exe[957111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10903312.160240] exe[997661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10903312.265204] exe[924192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10903702.451688] exe[987698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10903702.532503] exe[995391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10903702.587064] exe[956856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10903702.644786] exe[994698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df3c96686 cs:33 sp:7f9c77389f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10906019.364484] exe[88578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2dc5d3686 cs:33 sp:7fa0c5a4e8e8 ax:ffffffffff600000 si:7fa0c5a4ee08 di:ffffffffff600000 [10906019.464665] exe[89124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2dc5d3686 cs:33 sp:7fa0c5a4e8e8 ax:ffffffffff600000 si:7fa0c5a4ee08 di:ffffffffff600000 [10906019.558304] exe[88692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea7cab4686 cs:33 sp:7f0f3299f8e8 ax:ffffffffff600000 si:7f0f3299fe08 di:ffffffffff600000 [10906019.571086] exe[88686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2dc5d3686 cs:33 sp:7fa0c5a4e8e8 ax:ffffffffff600000 si:7fa0c5a4ee08 di:ffffffffff600000 [10906019.659673] exe[89144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea7cab4686 cs:33 sp:7f0f3299f8e8 ax:ffffffffff600000 si:7f0f3299fe08 di:ffffffffff600000 [10906019.674524] exe[88686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2dc5d3686 cs:33 sp:7fa0c5a4e8e8 ax:ffffffffff600000 si:7fa0c5a4ee08 di:ffffffffff600000 [10906019.761147] exe[88808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea7cab4686 cs:33 sp:7f0f3299f8e8 ax:ffffffffff600000 si:7f0f3299fe08 di:ffffffffff600000 [10906226.722041] exe[83550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556637155686 cs:33 sp:7f9e0ac25f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10906332.274481] exe[88841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c336ba686 cs:33 sp:7f947985f8e8 ax:ffffffffff600000 si:7f947985fe08 di:ffffffffff600000 [10906332.362209] exe[68212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c336ba686 cs:33 sp:7f947985f8e8 ax:ffffffffff600000 si:7f947985fe08 di:ffffffffff600000 [10906332.456471] exe[88482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c336ba686 cs:33 sp:7f947985f8e8 ax:ffffffffff600000 si:7f947985fe08 di:ffffffffff600000 [10906332.566139] exe[88615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c336ba686 cs:33 sp:7f947985f8e8 ax:ffffffffff600000 si:7f947985fe08 di:ffffffffff600000 [10906577.701560] exe[88888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a72da94686 cs:33 sp:7fb24976df88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10908426.481694] exe[150800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c527dad686 cs:33 sp:7f4ed2bc9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10908426.814858] exe[151415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c527dad686 cs:33 sp:7f4ed2bc9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10908427.180005] exe[150855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c527dad686 cs:33 sp:7f4ed2bc9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10908462.150502] exe[158248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be189f9686 cs:33 sp:7f66217608e8 ax:ffffffffff600000 si:7f6621760e08 di:ffffffffff600000 [10908628.732550] exe[148285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa0624d686 cs:33 sp:7f239e68a8e8 ax:ffffffffff600000 si:7f239e68ae08 di:ffffffffff600000 [10908998.353249] exe[173658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581fe351686 cs:33 sp:7efb050d08e8 ax:ffffffffff600000 si:7efb050d0e08 di:ffffffffff600000 [10908998.447391] exe[174475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581fe351686 cs:33 sp:7efb050d08e8 ax:ffffffffff600000 si:7efb050d0e08 di:ffffffffff600000 [10908998.511313] exe[175352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581fe351686 cs:33 sp:7efb050d08e8 ax:ffffffffff600000 si:7efb050d0e08 di:ffffffffff600000 [10909130.636325] exe[145687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaefa0d3e8 cs:33 sp:7fc3757b6f90 ax:7fc3757b7020 si:ffffffffff600000 di:55aaefac7019 [10909131.397539] exe[145711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaefa0d3e8 cs:33 sp:7fc3757b6f90 ax:7fc3757b7020 si:ffffffffff600000 di:55aaefac7019 [10909131.524391] exe[162131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaefa0d3e8 cs:33 sp:7fc3757b6f90 ax:7fc3757b7020 si:ffffffffff600000 di:55aaefac7019 [10909260.409394] exe[143364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581fe351686 cs:33 sp:7efb050d08e8 ax:ffffffffff600000 si:7efb050d0e08 di:ffffffffff600000 [10909260.465326] exe[178585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581fe351686 cs:33 sp:7efb0508e8e8 ax:ffffffffff600000 si:7efb0508ee08 di:ffffffffff600000 [10909260.528490] exe[172893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581fe351686 cs:33 sp:7efb050af8e8 ax:ffffffffff600000 si:7efb050afe08 di:ffffffffff600000 [10909296.712366] exe[182398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee7d853e8 cs:33 sp:7f39eadb2f90 ax:7f39eadb3020 si:ffffffffff600000 di:555ee7e3f019 [10909296.835179] exe[174103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee7d853e8 cs:33 sp:7f39eadb2f90 ax:7f39eadb3020 si:ffffffffff600000 di:555ee7e3f019 [10909296.870400] exe[183393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee7d853e8 cs:33 sp:7f39eadb2f90 ax:7f39eadb3020 si:ffffffffff600000 di:555ee7e3f019 [10909296.976508] exe[183409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee7d853e8 cs:33 sp:7f39eadb2f90 ax:7f39eadb3020 si:ffffffffff600000 di:555ee7e3f019 [10909375.634162] exe[159422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559488aae391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [10909375.759640] exe[155378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559488aae391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [10909375.851921] exe[159422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559488aae391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000000 [10909814.702817] exe[143502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.513399] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.534609] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.555747] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.577622] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.600056] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.621646] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.643890] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.666007] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909815.688994] exe[193091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560232091686 cs:33 sp:7fe8767428e8 ax:ffffffffff600000 si:7fe876742e08 di:ffffffffff600000 [10909932.351842] warn_bad_vsyscall: 57 callbacks suppressed [10909932.351845] exe[169376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ebace8686 cs:33 sp:7fa75f56ef88 ax:ffffffffff600000 si:20001100 di:ffffffffff600000 [10909933.170014] exe[189753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ebace8686 cs:33 sp:7fa75f50bf88 ax:ffffffffff600000 si:20001100 di:ffffffffff600000 [10909934.030318] exe[189672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ebace8686 cs:33 sp:7fa75f58ff88 ax:ffffffffff600000 si:20001100 di:ffffffffff600000 [10910525.454393] exe[170411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f27d2a8686 cs:33 sp:7ee5013968e8 ax:ffffffffff600000 si:7ee501396e08 di:ffffffffff600000 [10910525.591782] exe[170499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f27d2a8686 cs:33 sp:7ee5013968e8 ax:ffffffffff600000 si:7ee501396e08 di:ffffffffff600000 [10910525.627985] exe[170499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f27d2a8686 cs:33 sp:7ee5013758e8 ax:ffffffffff600000 si:7ee501375e08 di:ffffffffff600000 [10910525.844028] exe[170298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f27d2a8686 cs:33 sp:7ee5013968e8 ax:ffffffffff600000 si:7ee501396e08 di:ffffffffff600000 [10911321.940012] exe[156495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ae3d7b686 cs:33 sp:7ee4f6285f88 ax:ffffffffff600000 si:20002240 di:ffffffffff600000 [10911321.999532] exe[145913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ae3d7b686 cs:33 sp:7ee4f6264f88 ax:ffffffffff600000 si:20002240 di:ffffffffff600000 [10911322.088279] exe[145910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ae3d7b686 cs:33 sp:7ee4f6264f88 ax:ffffffffff600000 si:20002240 di:ffffffffff600000 [10911967.669430] exe[243604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce1d9d2686 cs:33 sp:7eec15c3d8e8 ax:ffffffffff600000 si:7eec15c3de08 di:ffffffffff600000 [10911967.986996] exe[243485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55711e896686 cs:33 sp:7f528be4e8e8 ax:ffffffffff600000 si:7f528be4ee08 di:ffffffffff600000 [10911970.531592] exe[224412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3ca84a686 cs:33 sp:7f88a8dfe8e8 ax:ffffffffff600000 si:7f88a8dfee08 di:ffffffffff600000 [10912143.421936] exe[175631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa4e342686 cs:33 sp:7fdf88f598e8 ax:ffffffffff600000 si:7fdf88f59e08 di:ffffffffff600000 [10912157.328856] exe[246197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55632b171686 cs:33 sp:7f19c92d28e8 ax:ffffffffff600000 si:7f19c92d2e08 di:ffffffffff600000 [10912179.012384] exe[259923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56133c7bf686 cs:33 sp:7ff0d05fd8e8 ax:ffffffffff600000 si:7ff0d05fde08 di:ffffffffff600000 [10912251.252475] exe[261057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55632b1223e8 cs:33 sp:7f19c92d2f90 ax:7f19c92d3020 si:ffffffffff600000 di:55632b1dc019 [10912251.467485] exe[241711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55632b1223e8 cs:33 sp:7f19c92d2f90 ax:7f19c92d3020 si:ffffffffff600000 di:55632b1dc019 [10912251.541908] exe[249195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55632b1223e8 cs:33 sp:7f19c92d2f90 ax:7f19c92d3020 si:ffffffffff600000 di:55632b1dc019 [10912272.340154] exe[262663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648776c5686 cs:33 sp:7fb9b17418e8 ax:ffffffffff600000 si:7fb9b1741e08 di:ffffffffff600000 [10912344.486231] exe[270525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb8a12686 cs:33 sp:7fb4e6cc78e8 ax:ffffffffff600000 si:7fb4e6cc7e08 di:ffffffffff600000 [10912344.574438] exe[266854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56195d6a3686 cs:33 sp:7ec0df5ab8e8 ax:ffffffffff600000 si:7ec0df5abe08 di:ffffffffff600000 [10912344.820974] exe[246061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556cb56fe686 cs:33 sp:7fdd6e32e8e8 ax:ffffffffff600000 si:7fdd6e32ee08 di:ffffffffff600000 [10912344.892583] exe[266303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6abc6b686 cs:33 sp:7f1c55f098e8 ax:ffffffffff600000 si:7f1c55f09e08 di:ffffffffff600000 [10912345.602930] exe[250349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dbe7b3686 cs:33 sp:7fcd9f1b08e8 ax:ffffffffff600000 si:7fcd9f1b0e08 di:ffffffffff600000 [10912345.644967] exe[266016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0a6f26686 cs:33 sp:7ebb9d2a48e8 ax:ffffffffff600000 si:7ebb9d2a4e08 di:ffffffffff600000 [10912662.760012] exe[233884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb344b8686 cs:33 sp:7ea52154b8e8 ax:ffffffffff600000 si:7ea52154be08 di:ffffffffff600000 [10913452.016805] exe[256597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915e0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913452.068782] exe[252795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915e0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913452.069623] exe[253102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915bff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913452.154762] exe[252648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915e0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.251325] exe[252471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.315269] exe[252512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.389489] exe[252512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.492023] exe[283095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.556879] exe[282901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.618917] exe[269881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.673822] exe[252569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.732710] exe[252907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.801763] exe[282896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913458.883999] exe[253277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.255621] warn_bad_vsyscall: 197 callbacks suppressed [10913463.255624] exe[269881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.284128] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.305268] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.328060] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.350631] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.371552] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.393648] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.416299] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.437112] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913463.459766] exe[252455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.290119] warn_bad_vsyscall: 283 callbacks suppressed [10913468.290124] exe[266244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.366219] exe[253002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.430158] exe[252417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.496248] exe[266358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f79af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.551283] exe[252781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913468.608900] exe[253362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913468.673069] exe[253237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913468.737508] exe[252480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.791794] exe[266244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913468.852462] exe[252591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.295519] warn_bad_vsyscall: 317 callbacks suppressed [10913473.295523] exe[252456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.396237] exe[252351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f79af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.465792] exe[269881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.521945] exe[252364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.589455] exe[252781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.611268] exe[282907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.689997] exe[252571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.754825] exe[266244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.775061] exe[266244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913473.795656] exe[266244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913478.349783] warn_bad_vsyscall: 148 callbacks suppressed [10913478.349787] exe[282901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913478.413734] exe[253102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913478.479726] exe[252573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913478.543688] exe[253013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913478.616607] exe[253002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913478.704545] exe[253002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913478.779017] exe[253002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913478.806522] exe[252591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10913478.889997] exe[252351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913478.970985] exe[285189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913611.496343] warn_bad_vsyscall: 11 callbacks suppressed [10913611.496347] exe[282907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915e0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913611.562636] exe[282888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915bff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913611.624118] exe[253281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f638e2686 cs:33 sp:7f30915e0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913659.755319] exe[260029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb344b8686 cs:33 sp:7ea52154bf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913764.976936] exe[278513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fcecae686 cs:33 sp:7ee51b7eff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913812.271307] exe[242972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562349f93686 cs:33 sp:7f8cdcb8df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913817.258333] exe[295369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56195d6a3686 cs:33 sp:7ec0df5abf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913826.988709] exe[284943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb8a12686 cs:33 sp:7fb4e6cc7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913828.431734] exe[275749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6abc6b686 cs:33 sp:7f1c55f09f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913908.762516] exe[275126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55618310d686 cs:33 sp:7f79868908e8 ax:ffffffffff600000 si:7f7986890e08 di:ffffffffff600000 [10913908.875800] exe[275399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55618310d686 cs:33 sp:7f79868908e8 ax:ffffffffff600000 si:7f7986890e08 di:ffffffffff600000 [10913953.775106] exe[247603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d82dc686 cs:33 sp:7f441467ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10913954.507844] exe[259228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [10913954.602550] exe[252859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7bbf88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [10913954.691594] exe[252859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f7dcf88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [10913954.718611] exe[253098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cb1083686 cs:33 sp:7f4c4f79af88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [10914108.733470] exe[266825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6a88c5686 cs:33 sp:7f90c15eff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10914114.859892] exe[251652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562737f1f686 cs:33 sp:7f46cf69ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10914230.002954] exe[245566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f37dc4686 cs:33 sp:7eeb59a97f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10914243.898648] exe[299639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56133c7bf686 cs:33 sp:7ff0d05fdf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10914499.180981] exe[298242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a546b02686 cs:33 sp:7f5ff0519f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10914776.391762] exe[301158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55957510a686 cs:33 sp:7f9b555698e8 ax:ffffffffff600000 si:7f9b55569e08 di:ffffffffff600000 [10914777.198328] exe[267672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55957510a686 cs:33 sp:7f9b555698e8 ax:ffffffffff600000 si:7f9b55569e08 di:ffffffffff600000 [10914777.392614] exe[303423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55957510a686 cs:33 sp:7f9b555488e8 ax:ffffffffff600000 si:7f9b55548e08 di:ffffffffff600000 [10914969.745109] exe[277246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562856ec4686 cs:33 sp:7f839484ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10917755.662746] exe[365846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56305fd483e8 cs:33 sp:7f21a659cf90 ax:7f21a659d020 si:ffffffffff600000 di:56305fe02019 [10917755.774440] exe[381537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56305fd483e8 cs:33 sp:7f21a659cf90 ax:7f21a659d020 si:ffffffffff600000 di:56305fe02019 [10917755.874631] exe[381540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56305fd483e8 cs:33 sp:7f21a659cf90 ax:7f21a659d020 si:ffffffffff600000 di:56305fe02019 [10921820.213592] exe[449428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e70bfe3e8 cs:33 sp:7f7e47b53f90 ax:7f7e47b54020 si:ffffffffff600000 di:562e70cb8019 [10921820.323589] exe[449428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e70bfe3e8 cs:33 sp:7f7e47b53f90 ax:7f7e47b54020 si:ffffffffff600000 di:562e70cb8019 [10921820.413748] exe[449307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e70bfe3e8 cs:33 sp:7f7e47b53f90 ax:7f7e47b54020 si:ffffffffff600000 di:562e70cb8019 [10922372.352248] exe[491680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556769dd7686 cs:33 sp:7ec618ab3f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [10922372.778576] exe[490863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556769dd7686 cs:33 sp:7ec618a92f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [10922373.163871] exe[490862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556769dd7686 cs:33 sp:7ec618ab3f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [10922912.053324] exe[520661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138ddb9686 cs:33 sp:7f2c3c1068e8 ax:ffffffffff600000 si:7f2c3c106e08 di:ffffffffff600000 [10922912.217879] exe[521211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138ddb9686 cs:33 sp:7f2c3c0e58e8 ax:ffffffffff600000 si:7f2c3c0e5e08 di:ffffffffff600000 [10923478.932680] exe[493762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0bade8686 cs:33 sp:7f763386a8e8 ax:ffffffffff600000 si:7f763386ae08 di:ffffffffff600000 [10923479.213981] exe[543554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0bade8686 cs:33 sp:7f76338498e8 ax:ffffffffff600000 si:7f7633849e08 di:ffffffffff600000 [10923483.299739] exe[494585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0bade8686 cs:33 sp:7f763386a8e8 ax:ffffffffff600000 si:7f763386ae08 di:ffffffffff600000 [10925519.957129] exe[574514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dcf0db1686 cs:33 sp:7ec9624ec8e8 ax:ffffffffff600000 si:7ec9624ece08 di:ffffffffff600000 [10925520.037713] exe[574514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dcf0db1686 cs:33 sp:7ec9624ec8e8 ax:ffffffffff600000 si:7ec9624ece08 di:ffffffffff600000 [10925520.107506] exe[574569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dcf0db1686 cs:33 sp:7ec9624ec8e8 ax:ffffffffff600000 si:7ec9624ece08 di:ffffffffff600000 [10926218.525873] exe[535834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc467f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.599072] exe[507967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.622445] exe[507967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.644170] exe[507967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.668376] exe[521023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.689565] exe[518429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.711601] exe[518429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.733336] exe[518429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.754799] exe[518429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926218.776659] exe[518429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aca4f53686 cs:33 sp:7f4acc446f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10926581.112511] warn_bad_vsyscall: 121 callbacks suppressed [10926581.112514] exe[607815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d04a9686 cs:33 sp:7fa94fc358e8 ax:ffffffffff600000 si:7fa94fc35e08 di:ffffffffff600000 [10926581.197420] exe[610193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d04a9686 cs:33 sp:7fa94fc358e8 ax:ffffffffff600000 si:7fa94fc35e08 di:ffffffffff600000 [10926581.285025] exe[584746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d04a9686 cs:33 sp:7fa94fc358e8 ax:ffffffffff600000 si:7fa94fc35e08 di:ffffffffff600000 [10926581.315904] exe[607815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634d04a9686 cs:33 sp:7fa94fc358e8 ax:ffffffffff600000 si:7fa94fc35e08 di:ffffffffff600000 [10927534.975867] exe[604013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784ec3e3e8 cs:33 sp:7f0e437fef90 ax:7f0e437ff020 si:ffffffffff600000 di:55784ecf8019 [10927535.765710] exe[611028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784ec3e3e8 cs:33 sp:7f0e437ddf90 ax:7f0e437de020 si:ffffffffff600000 di:55784ecf8019 [10927535.845848] exe[594854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784ec3e3e8 cs:33 sp:7f0e437fef90 ax:7f0e437ff020 si:ffffffffff600000 di:55784ecf8019 [10927918.139690] exe[594146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1e5820686 cs:33 sp:7ff2df760f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10927918.197421] exe[594672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1e5820686 cs:33 sp:7ff2df73ff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10927918.277751] exe[594236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1e5820686 cs:33 sp:7ff2df760f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10927918.306730] exe[594275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1e5820686 cs:33 sp:7ff2df73ff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10928056.237618] exe[648785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578731f33e8 cs:33 sp:7f34a5163f90 ax:7f34a5164020 si:ffffffffff600000 di:5578732ad019 [10928059.471481] exe[649068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578731f33e8 cs:33 sp:7f34a51a5f90 ax:7f34a51a6020 si:ffffffffff600000 di:5578732ad019 [10928228.080045] exe[646935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d53b5f4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10928228.235966] exe[646442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d53b5f4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10928228.357812] exe[620597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d53b5f4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10931671.914610] exe[723393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605ce2c63e8 cs:33 sp:7ede97fbdf90 ax:7ede97fbe020 si:ffffffffff600000 di:5605ce380019 [10931671.983657] exe[725649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605ce2c63e8 cs:33 sp:7ede97fbdf90 ax:7ede97fbe020 si:ffffffffff600000 di:5605ce380019 [10931672.705145] exe[723393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605ce2c63e8 cs:33 sp:7ede97fbdf90 ax:7ede97fbe020 si:ffffffffff600000 di:5605ce380019 [10931973.471752] exe[744245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b40f31686 cs:33 sp:7f008bf8ff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10931973.572387] exe[743456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b40f31686 cs:33 sp:7f008bf8ff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10931973.576629] exe[744239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b40f31686 cs:33 sp:7f008bf6ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10931973.728076] exe[744204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b40f31686 cs:33 sp:7f008bf4df88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10933150.684578] exe[742069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a943733686 cs:33 sp:7ed8161e3f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10933150.742799] exe[726740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a943733686 cs:33 sp:7ed8161c2f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10933150.830018] exe[726697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a943733686 cs:33 sp:7ed8161c2f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10933386.800352] exe[573995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.166381] exe[567123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.200737] exe[722936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.226555] exe[568459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.284867] exe[567042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.295306] exe[758585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.338572] exe[722936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.388358] exe[568459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.440732] exe[567042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10933387.626333] exe[722936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624de2ec391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:90c0200 [10935914.394726] warn_bad_vsyscall: 25 callbacks suppressed [10935914.394729] exe[828161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a92c056686 cs:33 sp:7f8f1b48b8e8 ax:ffffffffff600000 si:7f8f1b48be08 di:ffffffffff600000 [10935915.227195] exe[861261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a92c056686 cs:33 sp:7f8f1b48b8e8 ax:ffffffffff600000 si:7f8f1b48be08 di:ffffffffff600000 [10935915.298078] exe[861040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a92c056686 cs:33 sp:7f8f1b48b8e8 ax:ffffffffff600000 si:7f8f1b48be08 di:ffffffffff600000 [10936541.489427] exe[843755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eeece9686 cs:33 sp:7f79034d38e8 ax:ffffffffff600000 si:7f79034d3e08 di:ffffffffff600000 [10936541.595309] exe[822663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eeece9686 cs:33 sp:7f79034d38e8 ax:ffffffffff600000 si:7f79034d3e08 di:ffffffffff600000 [10936541.691185] exe[799511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eeece9686 cs:33 sp:7f79034d38e8 ax:ffffffffff600000 si:7f79034d3e08 di:ffffffffff600000 [10937276.143749] exe[904096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357d15e686 cs:33 sp:7f0e4cfccf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10937276.873696] exe[906108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357d15e686 cs:33 sp:7f0e4cfccf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10937276.895680] exe[904404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357d15e686 cs:33 sp:7f0e4cfccf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10937276.947495] exe[906091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357d15e686 cs:33 sp:7f0e4cfccf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10938456.610733] exe[899437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8ea2fa686 cs:33 sp:7fa54f372f88 ax:ffffffffff600000 si:200037c0 di:ffffffffff600000 [10938457.444939] exe[933489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8ea2fa686 cs:33 sp:7fa54f372f88 ax:ffffffffff600000 si:200037c0 di:ffffffffff600000 [10938457.546820] exe[932617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8ea2fa686 cs:33 sp:7fa54f30ff88 ax:ffffffffff600000 si:200037c0 di:ffffffffff600000 [10939009.011334] exe[902658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641f72b5686 cs:33 sp:7eafe305cf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10939009.060858] exe[929579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641f72b5686 cs:33 sp:7eafe305cf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10939009.083182] exe[902658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641f72b5686 cs:33 sp:7eafe305cf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10939009.173981] exe[902644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641f72b5686 cs:33 sp:7eafe23fef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10939831.276263] exe[918714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fec736686 cs:33 sp:7fb90f6d28e8 ax:ffffffffff600000 si:7fb90f6d2e08 di:ffffffffff600000 [10939831.466803] exe[921110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fec736686 cs:33 sp:7fb90f6d28e8 ax:ffffffffff600000 si:7fb90f6d2e08 di:ffffffffff600000 [10939831.467553] exe[920036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fec736686 cs:33 sp:7fb90f6b18e8 ax:ffffffffff600000 si:7fb90f6b1e08 di:ffffffffff600000 [10939831.638073] exe[921294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fec736686 cs:33 sp:7fb90f6b18e8 ax:ffffffffff600000 si:7fb90f6b1e08 di:ffffffffff600000 [10940882.438912] exe[941556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a7c2f3e8 cs:33 sp:7fcad5e98f90 ax:7fcad5e99020 si:ffffffffff600000 di:5601a7ce9019 [10940883.297828] exe[939307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a7c2f3e8 cs:33 sp:7fcad5e98f90 ax:7fcad5e99020 si:ffffffffff600000 di:5601a7ce9019 [10940883.375288] exe[938252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a7c2f3e8 cs:33 sp:7fcad5e35f90 ax:7fcad5e36020 si:ffffffffff600000 di:5601a7ce9019 [10940884.149461] exe[973923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a7c2f3e8 cs:33 sp:7fcad5e77f90 ax:7fcad5e78020 si:ffffffffff600000 di:5601a7ce9019 [10943206.370106] exe[31467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b60ef3e8 cs:33 sp:7eb0a64abf90 ax:7eb0a64ac020 si:ffffffffff600000 di:5557b61a9019 [10943206.425742] exe[32119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b60ef3e8 cs:33 sp:7eb0a64abf90 ax:7eb0a64ac020 si:ffffffffff600000 di:5557b61a9019 [10943206.485632] exe[32962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557b60ef3e8 cs:33 sp:7eb0a64abf90 ax:7eb0a64ac020 si:ffffffffff600000 di:5557b61a9019 [10945246.081726] exe[97549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56354fa9e686 cs:33 sp:7f446983df88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10945246.163003] exe[113273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56354fa9e686 cs:33 sp:7f446983df88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10945246.222076] exe[124594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56354fa9e686 cs:33 sp:7f446983df88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10945650.819543] exe[143731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e96b3686 cs:33 sp:7f6c818908e8 ax:ffffffffff600000 si:7f6c81890e08 di:ffffffffff600000 [10945651.057159] exe[134674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e96b3686 cs:33 sp:7f6c818908e8 ax:ffffffffff600000 si:7f6c81890e08 di:ffffffffff600000 [10945651.158300] exe[144651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e96b3686 cs:33 sp:7f6c8184e8e8 ax:ffffffffff600000 si:7f6c8184ee08 di:ffffffffff600000 [10945651.349978] exe[144685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e96b3686 cs:33 sp:7f6c818908e8 ax:ffffffffff600000 si:7f6c81890e08 di:ffffffffff600000 [10945658.271949] exe[144699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945658.556064] exe[139488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945658.884099] exe[144474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945659.158281] exe[143201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945659.384580] exe[134299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945659.518896] exe[136207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945659.718892] exe[144944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945659.728879] exe[142808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945659.871781] exe[144797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945659.873963] exe[134299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945666.384339] warn_bad_vsyscall: 82 callbacks suppressed [10945666.384343] exe[136204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945666.599049] exe[145964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945666.886423] exe[143731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9688e8 ax:ffffffffff600000 si:7f7d0e968e08 di:ffffffffff600000 [10945666.999019] exe[144614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945667.256677] exe[144863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945667.464009] exe[148117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945667.928091] exe[138595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945668.085281] exe[135552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945668.190752] exe[138869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945668.239606] exe[138805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945671.433983] warn_bad_vsyscall: 8 callbacks suppressed [10945671.433998] exe[144912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945671.542727] exe[145951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945671.841736] exe[138546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945671.924714] exe[134429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945672.057022] exe[147906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945673.007474] exe[142818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945673.158176] exe[134411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945673.350646] exe[136166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945673.461607] exe[146036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945673.548392] exe[139842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945676.517467] warn_bad_vsyscall: 82 callbacks suppressed [10945676.517470] exe[139853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945676.580260] exe[144786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945676.779898] exe[138855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945677.186628] exe[138855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945677.435309] exe[140101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945677.884484] exe[146088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945677.953734] exe[146279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945678.037643] exe[144931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945678.083166] exe[144931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945678.228648] exe[135392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945681.534805] warn_bad_vsyscall: 13 callbacks suppressed [10945681.534807] exe[143204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945681.751335] exe[144733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945681.850422] exe[146417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945681.868220] exe[144422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945682.029766] exe[144594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945682.137801] exe[144910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945682.284206] exe[139502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945682.289734] exe[139461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945682.543749] exe[147013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945682.681254] exe[133945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945686.617028] warn_bad_vsyscall: 8 callbacks suppressed [10945686.617032] exe[135295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945686.750023] exe[135188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945686.805705] exe[135188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945686.933438] exe[144600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945687.115560] exe[144600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945687.406136] exe[139238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945687.408918] exe[138636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945687.915308] exe[135660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945688.180692] exe[138614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945688.349797] exe[146336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945694.645244] warn_bad_vsyscall: 74 callbacks suppressed [10945694.645247] exe[135657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945694.861134] exe[144102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945695.071567] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.103198] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.124645] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.149170] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.170123] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.196077] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.218943] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945695.242132] exe[138837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945700.197941] warn_bad_vsyscall: 147 callbacks suppressed [10945700.197945] exe[143665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945700.340820] exe[144478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945700.524364] exe[133475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945700.680485] exe[144489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945700.680493] exe[133969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945701.032562] exe[134880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945701.060007] exe[134880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945701.085199] exe[134880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945701.129458] exe[134880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945701.153311] exe[134880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945705.714689] warn_bad_vsyscall: 111 callbacks suppressed [10945705.714692] exe[146279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945705.885384] exe[146393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945706.616870] exe[144466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945706.734447] exe[148514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945706.793143] exe[144685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945706.796579] exe[143651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945706.999695] exe[144345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945707.184076] exe[143665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945707.361980] exe[138958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945707.457388] exe[144345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945711.043936] warn_bad_vsyscall: 6 callbacks suppressed [10945711.043939] exe[144472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945711.267425] exe[139512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945711.592514] exe[145151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945711.705327] exe[144659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945712.203103] exe[144600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945712.485364] exe[135314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945712.634969] exe[138638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945712.804389] exe[144865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9898e8 ax:ffffffffff600000 si:7f7d0e989e08 di:ffffffffff600000 [10945713.044381] exe[147197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945713.270029] exe[143796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945716.266492] warn_bad_vsyscall: 13 callbacks suppressed [10945716.266495] exe[144792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945716.533522] exe[144934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945716.656448] exe[144662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945716.797643] exe[136037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945719.720274] exe[140065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945719.845924] exe[136232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945720.432098] exe[136232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945720.681171] exe[144430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945720.804620] exe[139714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945721.053555] exe[143629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945721.765367] warn_bad_vsyscall: 2 callbacks suppressed [10945721.765371] exe[136216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945721.825492] exe[144535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945721.933580] exe[139248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945722.034486] exe[143665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945722.665553] exe[144856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945723.095504] exe[146470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945723.252909] exe[148057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945723.346335] exe[133562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945723.375531] exe[133562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945723.551492] exe[147160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945726.858299] warn_bad_vsyscall: 15 callbacks suppressed [10945726.858302] exe[144921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945727.575982] exe[148666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945727.715263] exe[144886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945729.475008] exe[138476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945729.745618] exe[144620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945729.964614] exe[143796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945730.092137] exe[144832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945730.174872] exe[134259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945730.283660] exe[139527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945730.318839] exe[139539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945731.946200] warn_bad_vsyscall: 3 callbacks suppressed [10945731.946203] exe[146267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945732.125642] exe[139778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.153091] exe[139778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.181813] exe[139778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.205745] exe[139778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.233929] exe[139778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.257109] exe[133939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.285136] exe[133939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.307970] exe[133939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945732.343506] exe[135652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9aa8e8 ax:ffffffffff600000 si:7f7d0e9aae08 di:ffffffffff600000 [10945737.788377] warn_bad_vsyscall: 76 callbacks suppressed [10945737.788381] exe[146041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9cb8e8 ax:ffffffffff600000 si:7f7d0e9cbe08 di:ffffffffff600000 [10945737.926903] exe[143171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9898e8 ax:ffffffffff600000 si:7f7d0e989e08 di:ffffffffff600000 [10945739.268129] exe[147215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.469203] exe[144441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.535320] exe[146287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.716768] exe[144351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.744593] exe[144351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.770201] exe[144351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.792010] exe[144351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945739.813782] exe[144351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945742.907186] warn_bad_vsyscall: 134 callbacks suppressed [10945742.907190] exe[145054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.098245] exe[146043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.294910] exe[147131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.426404] exe[147131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.589612] exe[144520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.740826] exe[144970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.812632] exe[144655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945743.966474] exe[134685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945744.080827] exe[146043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10945744.267899] exe[133475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55597ae0c686 cs:33 sp:7f7d0e9ec8e8 ax:ffffffffff600000 si:7f7d0e9ece08 di:ffffffffff600000 [10946055.080601] warn_bad_vsyscall: 67 callbacks suppressed [10946055.080605] exe[150372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946055.149385] exe[150449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946055.235472] exe[151076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f5258595f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946074.817394] exe[150534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946074.877558] exe[150916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946074.947728] exe[151116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946074.997259] exe[150543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946075.056864] exe[150834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946075.112172] exe[150755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946075.199743] exe[150999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946075.283622] exe[151116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946075.355885] exe[150810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946075.452027] exe[150884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946084.635388] warn_bad_vsyscall: 7 callbacks suppressed [10946084.635392] exe[151035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a38bb31686 cs:33 sp:7fb99abedf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946084.722812] exe[151035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a38bb31686 cs:33 sp:7fb99abccf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946084.724886] exe[150454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a38bb31686 cs:33 sp:7fb99abedf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946084.832199] exe[151288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a38bb31686 cs:33 sp:7fb99abedf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946084.872762] exe[150850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a38bb31686 cs:33 sp:7fb99abccf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946091.715902] exe[150832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1628f686 cs:33 sp:7f48ee289f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946091.783460] exe[150412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1628f686 cs:33 sp:7f48ee289f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946091.927742] exe[150728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1628f686 cs:33 sp:7f48ee289f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946091.970615] exe[150396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1628f686 cs:33 sp:7f48ee289f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946177.172356] exe[150925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946177.216383] exe[150862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047778f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10946177.292715] exe[150534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ba398c686 cs:33 sp:7f4047799f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948199.031718] exe[210304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d2a0e6020 cs:33 sp:7f2d7e103110 ax:562d2a0e6020 si:4 di:562d2a1a6ab0 [10948451.801022] exe[209085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cf1053686 cs:33 sp:7eb066f39f88 ax:ffffffffff600000 si:20003980 di:ffffffffff600000 [10948452.597346] exe[202012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cf1053686 cs:33 sp:7eb066f18f88 ax:ffffffffff600000 si:20003980 di:ffffffffff600000 [10948452.658209] exe[204500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cf1053686 cs:33 sp:7eb066f39f88 ax:ffffffffff600000 si:20003980 di:ffffffffff600000 [10948994.947376] exe[176754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10948995.011647] exe[139982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10948995.083575] exe[196329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10948995.163387] exe[138949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948995.235184] exe[138991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f5258595f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948995.313837] exe[149671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948995.377338] exe[176747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948995.449144] exe[146743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948995.521292] exe[223368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948995.545854] exe[229537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10948999.978509] warn_bad_vsyscall: 190 callbacks suppressed [10948999.978513] exe[146693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.047746] exe[138949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.101116] exe[150800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.122091] exe[233235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.144146] exe[231141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.165794] exe[231141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.187644] exe[231141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.209245] exe[150422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.242198] exe[223368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949000.263940] exe[150422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949005.044421] warn_bad_vsyscall: 269 callbacks suppressed [10949005.044425] exe[233122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949005.118100] exe[137877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949005.141690] exe[175869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949005.210988] exe[149943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [10949005.282610] exe[177748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949005.360601] exe[142848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949005.437495] exe[231149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f5258595f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949005.503807] exe[146814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949005.583388] exe[232678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949005.642574] exe[138987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949010.156622] warn_bad_vsyscall: 338 callbacks suppressed [10949010.156626] exe[176136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949010.232035] exe[150422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949010.294263] exe[175939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949010.317308] exe[150422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949010.398410] exe[176136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10949010.468351] exe[151372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [10949010.574135] exe[146793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [10949010.645926] exe[146488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [10949010.669428] exe[149943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585b6f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [10949010.736045] exe[146743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562192765686 cs:33 sp:7f52585d7f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10951206.281111] warn_bad_vsyscall: 32 callbacks suppressed [10951206.281115] exe[278812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625f1fdf686 cs:33 sp:7fdcec71a8e8 ax:ffffffffff600000 si:7fdcec71ae08 di:ffffffffff600000 [10951207.688663] exe[272838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625f1fdf686 cs:33 sp:7fdcec71a8e8 ax:ffffffffff600000 si:7fdcec71ae08 di:ffffffffff600000 [10951209.559082] exe[276537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625f1fdf686 cs:33 sp:7fdcec1bc8e8 ax:ffffffffff600000 si:7fdcec1bce08 di:ffffffffff600000 [10952541.104048] exe[301224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.158107] exe[301059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.178409] exe[301224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.198836] exe[301075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.219718] exe[301076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.241059] exe[301075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.261675] exe[301224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.284877] exe[301224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.306136] exe[301075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952541.326762] exe[301076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac184d73e8 cs:33 sp:7ec400ebdf90 ax:7ec400ebe020 si:ffffffffff600000 di:55ac18591019 [10952769.764612] warn_bad_vsyscall: 57 callbacks suppressed [10952769.764617] exe[335931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.195835] exe[335931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.348338] exe[280444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.395134] exe[325566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.447899] exe[280444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.500637] exe[280444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.543672] exe[335931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.587918] exe[325566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.634027] exe[325566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952770.678116] exe[335931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:20008bc0 di:ffffffffff600000 [10952787.192022] warn_bad_vsyscall: 57 callbacks suppressed [10952787.192025] exe[315123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abad55e686 cs:33 sp:7fd5b1794f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10952807.769972] exe[300603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650908d6686 cs:33 sp:7f5ac107af88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10952827.103186] exe[309800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1afe42686 cs:33 sp:7f6c1267af88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10952855.061354] exe[302322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b0ff42686 cs:33 sp:7efef7eb9f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10952855.146314] exe[324557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b0ff42686 cs:33 sp:7efef7eb9f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10952855.235229] exe[335946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b0ff42686 cs:33 sp:7efef7eb9f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10952895.941212] exe[325568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632506ee686 cs:33 sp:7ee85dcaef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10952901.232183] exe[260123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f5c78686 cs:33 sp:7ea352b9ff88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953116.254155] exe[343491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56245b4b6686 cs:33 sp:7ec9e7df0f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953132.295113] exe[336339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636f34f5686 cs:33 sp:7f42493c4f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953132.739895] exe[306226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bc6cb0686 cs:33 sp:7f7f8b5fef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953134.677714] exe[323518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9d6324686 cs:33 sp:7ed80b1cef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953135.381963] exe[318371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e349344686 cs:33 sp:7fa9f51fdf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953140.020132] exe[336151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e8ec55686 cs:33 sp:7f6b79b18f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10953140.081297] exe[310883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615b05ff686 cs:33 sp:7efd84c8df88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10954108.002482] exe[443726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa25b15686 cs:33 sp:7febe2fb4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10954341.037825] exe[438022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bcfdb96686 cs:33 sp:7eff222ab8e8 ax:ffffffffff600000 si:7eff222abe08 di:ffffffffff600000 [10954341.253043] exe[430636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bcfdb96686 cs:33 sp:7eff222ab8e8 ax:ffffffffff600000 si:7eff222abe08 di:ffffffffff600000 [10954341.364871] exe[438007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bcfdb96686 cs:33 sp:7eff222ab8e8 ax:ffffffffff600000 si:7eff222abe08 di:ffffffffff600000 [10954341.463771] exe[450517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bcfdb96686 cs:33 sp:7eff222ab8e8 ax:ffffffffff600000 si:7eff222abe08 di:ffffffffff600000 [10955246.254812] exe[468229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f08585686 cs:33 sp:7ef0575cf8e8 ax:ffffffffff600000 si:7ef0575cfe08 di:ffffffffff600000 [10955246.317709] exe[468229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f08585686 cs:33 sp:7ef0575cf8e8 ax:ffffffffff600000 si:7ef0575cfe08 di:ffffffffff600000 [10955246.375313] exe[468228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f08585686 cs:33 sp:7ef0575cf8e8 ax:ffffffffff600000 si:7ef0575cfe08 di:ffffffffff600000 [10955246.398154] exe[468228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f08585686 cs:33 sp:7ef0575cf8e8 ax:ffffffffff600000 si:7ef0575cfe08 di:ffffffffff600000 [10956598.499687] exe[475269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2336b6686 cs:33 sp:7edeeaccd8e8 ax:ffffffffff600000 si:7edeeaccde08 di:ffffffffff600000 [10956598.564259] exe[475261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2336b6686 cs:33 sp:7edeeaccd8e8 ax:ffffffffff600000 si:7edeeaccde08 di:ffffffffff600000 [10956598.620169] exe[475261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2336b6686 cs:33 sp:7edeeaccd8e8 ax:ffffffffff600000 si:7edeeaccde08 di:ffffffffff600000 [10957369.737906] exe[517488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de93885686 cs:33 sp:7f72705d58e8 ax:ffffffffff600000 si:7f72705d5e08 di:ffffffffff600000 [10957369.837087] exe[520401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de93885686 cs:33 sp:7f72705d58e8 ax:ffffffffff600000 si:7f72705d5e08 di:ffffffffff600000 [10957369.930518] exe[519696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de93885686 cs:33 sp:7f72705d58e8 ax:ffffffffff600000 si:7f72705d5e08 di:ffffffffff600000 [10957369.947400] exe[513674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146feb6686 cs:33 sp:7f3a3eef58e8 ax:ffffffffff600000 si:7f3a3eef5e08 di:ffffffffff600000 [10957370.005485] exe[520361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de93885686 cs:33 sp:7f72705d58e8 ax:ffffffffff600000 si:7f72705d5e08 di:ffffffffff600000 [10957370.032846] exe[524674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146feb6686 cs:33 sp:7f3a3eef58e8 ax:ffffffffff600000 si:7f3a3eef5e08 di:ffffffffff600000 [10957370.109580] exe[514082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146feb6686 cs:33 sp:7f3a3eef58e8 ax:ffffffffff600000 si:7f3a3eef5e08 di:ffffffffff600000 [10957779.779105] exe[547309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22f41b686 cs:33 sp:7f7fa18c5f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10957779.851699] exe[535865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22f41b686 cs:33 sp:7f7fa18c5f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10957779.910128] exe[533054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22f41b686 cs:33 sp:7f7fa18c5f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10957779.967098] exe[526827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f22f41b686 cs:33 sp:7f7fa18c5f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10957816.053913] exe[548725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218e1f90 ax:7f4c218e2020 si:ffffffffff600000 di:55de6d05e019 [10957816.122382] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.143401] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.164356] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.188138] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.208562] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.233658] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.255290] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.277443] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10957816.298776] exe[550940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cfa43e8 cs:33 sp:7f4c218c0f90 ax:7f4c218c1020 si:ffffffffff600000 di:55de6d05e019 [10958260.120417] warn_bad_vsyscall: 57 callbacks suppressed [10958260.120420] exe[532843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562da9262686 cs:33 sp:7f51744edf88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10958260.202367] exe[535005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562da9262686 cs:33 sp:7f51744edf88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10958260.279344] exe[514251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562da9262686 cs:33 sp:7f51744edf88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10958260.354868] exe[518014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562da9262686 cs:33 sp:7f51744edf88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10959072.068886] exe[524443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615faf77686 cs:33 sp:7ea29dec48e8 ax:ffffffffff600000 si:7ea29dec4e08 di:ffffffffff600000 [10959097.483467] exe[581400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ab5627686 cs:33 sp:7ee241c428e8 ax:ffffffffff600000 si:7ee241c42e08 di:ffffffffff600000 [10959098.761259] exe[537225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577b779c686 cs:33 sp:7ff90d513f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [10959114.752594] exe[556836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de6cff3686 cs:33 sp:7f4c218e18e8 ax:ffffffffff600000 si:7f4c218e1e08 di:ffffffffff600000 [10959121.384660] exe[581292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565161766686 cs:33 sp:7fc329f748e8 ax:ffffffffff600000 si:7fc329f74e08 di:ffffffffff600000 [10959220.428492] exe[554485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c5e08e686 cs:33 sp:7f0a54858f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [10959433.763400] exe[555794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b6e9d2686 cs:33 sp:7fc2667fe8e8 ax:ffffffffff600000 si:7fc2667fee08 di:ffffffffff600000 [10959479.480771] exe[582532] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640eedb8686 cs:33 sp:7f6b3b2e38e8 ax:ffffffffff600000 si:7f6b3b2e3e08 di:ffffffffff600000 [10959501.535389] exe[437160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f19c019686 cs:33 sp:7ed262ef68e8 ax:ffffffffff600000 si:7ed262ef6e08 di:ffffffffff600000 [10959565.918201] exe[538044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556374337686 cs:33 sp:7f09ac06cf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [10959790.160922] exe[592590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556374337686 cs:33 sp:7f09ac06c8e8 ax:ffffffffff600000 si:7f09ac06ce08 di:ffffffffff600000 [10959941.870908] exe[589582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55880643d686 cs:33 sp:7f4a977c08e8 ax:ffffffffff600000 si:7f4a977c0e08 di:ffffffffff600000 [10960701.820715] exe[614701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2c7b25686 cs:33 sp:7fbb3aaec8e8 ax:ffffffffff600000 si:7fbb3aaece08 di:ffffffffff600000 [10960767.001224] exe[622504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dcd7593686 cs:33 sp:7f957d3158e8 ax:ffffffffff600000 si:7f957d315e08 di:ffffffffff600000 [10960767.053816] exe[622883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dcd7593686 cs:33 sp:7f957d3158e8 ax:ffffffffff600000 si:7f957d315e08 di:ffffffffff600000 [10960767.405905] exe[622361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dcd7593686 cs:33 sp:7f957d3158e8 ax:ffffffffff600000 si:7f957d315e08 di:ffffffffff600000 [10960767.430709] exe[625079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960767.602627] exe[622608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960767.848560] exe[622510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960767.973168] exe[622919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960768.081291] exe[622449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960770.968576] exe[622608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960771.046786] exe[622476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960773.983630] warn_bad_vsyscall: 1 callbacks suppressed [10960773.983634] exe[622883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960774.054234] exe[622914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960776.987067] exe[622595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960777.053977] exe[628093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960777.841125] exe[628096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960777.892349] exe[622915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960777.947174] exe[625500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960778.016239] exe[628094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960778.090806] exe[622567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960778.150668] exe[622595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960779.766552] warn_bad_vsyscall: 17 callbacks suppressed [10960779.766556] exe[628236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960779.813391] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.834636] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.855108] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.876085] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.897849] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.919157] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.940639] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.961257] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960779.981993] exe[625066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960792.272336] warn_bad_vsyscall: 67 callbacks suppressed [10960792.272340] exe[628214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960795.296379] exe[622478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960798.299864] exe[629280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960801.327961] exe[626008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960801.374861] exe[626015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960801.376313] exe[625079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960801.447442] exe[622478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960801.472549] exe[628093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960810.548817] exe[622376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960810.593177] exe[624801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960810.639158] exe[622382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960810.803593] exe[630722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960811.549632] exe[624801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960811.610136] exe[629374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960811.650007] exe[622500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960821.446583] exe[622500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960821.505152] exe[626025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960821.558519] exe[630882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960821.559338] exe[622947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960821.634610] exe[622448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960821.678102] exe[622972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960821.730132] exe[622434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960821.783162] exe[629374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960821.872189] exe[622402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960821.950147] exe[622917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960831.318047] warn_bad_vsyscall: 3 callbacks suppressed [10960831.318052] exe[625079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960831.393583] exe[628186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960831.431994] exe[629280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59315c8e8 ax:ffffffffff600000 si:7ff59315ce08 di:ffffffffff600000 [10960832.176278] exe[622434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960832.205436] exe[622457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.316164] exe[622496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.365650] exe[629280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.387957] exe[622921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.438122] exe[630722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.697416] exe[622611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.756044] exe[629369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960841.809077] exe[628210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960841.809151] exe[622921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960850.949532] exe[622961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.002331] exe[622923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.003112] exe[629283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960851.066246] exe[622966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.203807] exe[623227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.246805] exe[622504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.272168] exe[630723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.490593] exe[622976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.511698] exe[622566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960851.554300] exe[624799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.433034] warn_bad_vsyscall: 17 callbacks suppressed [10960861.433037] exe[622524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.490603] exe[628236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.537444] exe[622388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.559808] exe[628212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.609827] exe[622384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.667576] exe[622923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960861.730486] exe[622976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960870.855965] exe[635044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960870.930322] exe[628221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960870.997006] exe[626008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960871.090566] exe[622617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960871.164262] exe[628196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960871.246167] exe[622624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960871.333185] exe[628234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960872.163501] exe[626015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960872.186275] exe[624800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960872.275129] exe[635159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960884.715226] warn_bad_vsyscall: 31 callbacks suppressed [10960884.715230] exe[628196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960884.772882] exe[622917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960884.847933] exe[622608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960894.784177] exe[622369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960894.841540] exe[628221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960894.911529] exe[628236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960897.824063] exe[628212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960897.878121] exe[622424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960900.834947] exe[622399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960900.880382] exe[636632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960903.844767] exe[622974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960903.900615] exe[625500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960903.924025] exe[622510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.020339] exe[622933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.072903] exe[636641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.142074] exe[622386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.208273] exe[622607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.280102] exe[622753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.303659] exe[622455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.346803] exe[628093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960913.393242] exe[628236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960916.415623] exe[622388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960919.416860] exe[622569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960922.429878] exe[626025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960922.485749] exe[622504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960922.556644] exe[622486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960922.608045] exe[622971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960922.654892] exe[636645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960922.704407] exe[628116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960925.648949] exe[622425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960925.727617] exe[622611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960928.678263] exe[622567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960928.702984] exe[622563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960928.766695] exe[622400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960931.683683] exe[622455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960931.734745] exe[628116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960931.791535] exe[630723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960931.856592] exe[628212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960931.913537] exe[628236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960931.963819] exe[628233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960932.032298] exe[622607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960932.112944] exe[622400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960932.165542] exe[622919] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960932.211380] exe[622376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960938.332260] warn_bad_vsyscall: 10 callbacks suppressed [10960938.332265] exe[622601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960938.399815] exe[628094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960938.425243] exe[622500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960941.348376] exe[624211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960941.372292] exe[622590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960941.419831] exe[636642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960944.429090] exe[622423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960947.442438] exe[622563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960959.560945] exe[622356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960959.617125] exe[624211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960960.399266] exe[624385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960960.428705] exe[622525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960960.493279] exe[628214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960960.539070] exe[636645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960960.596664] exe[622567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960960.604249] exe[626008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960960.666182] exe[626015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960960.716296] exe[622500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960972.383954] warn_bad_vsyscall: 12 callbacks suppressed [10960972.383958] exe[638472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960972.442638] exe[622567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960973.235680] exe[622944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960973.260991] exe[629283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59317d8e8 ax:ffffffffff600000 si:7ff59317de08 di:ffffffffff600000 [10960973.311321] exe[622362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960973.369268] exe[622356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960973.422187] exe[622388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960973.444682] exe[622449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff59319e8e8 ax:ffffffffff600000 si:7ff59319ee08 di:ffffffffff600000 [10960973.497965] exe[622569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10960973.558128] exe[622944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56115d97a686 cs:33 sp:7ff5931bf8e8 ax:ffffffffff600000 si:7ff5931bfe08 di:ffffffffff600000 [10961556.379731] warn_bad_vsyscall: 2 callbacks suppressed [10961556.379735] exe[657703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c13c8023e8 cs:33 sp:7f75b4667f90 ax:7f75b4668020 si:ffffffffff600000 di:55c13c8bc019 [10961556.448377] exe[657845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c13c8023e8 cs:33 sp:7f75b4667f90 ax:7f75b4668020 si:ffffffffff600000 di:55c13c8bc019 [10961556.526659] exe[659479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c13c8023e8 cs:33 sp:7f75b4667f90 ax:7f75b4668020 si:ffffffffff600000 di:55c13c8bc019 [10961582.252363] exe[652452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca9dfcd686 cs:33 sp:7f133b3398e8 ax:ffffffffff600000 si:7f133b339e08 di:ffffffffff600000 [10961582.406818] exe[641034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca9dfcd686 cs:33 sp:7f133b3398e8 ax:ffffffffff600000 si:7f133b339e08 di:ffffffffff600000 [10961582.519378] exe[654761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca9dfcd686 cs:33 sp:7f133b3398e8 ax:ffffffffff600000 si:7f133b339e08 di:ffffffffff600000 [10961582.636288] exe[654212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca9dfcd686 cs:33 sp:7f133b3398e8 ax:ffffffffff600000 si:7f133b339e08 di:ffffffffff600000 [10962445.703078] exe[722405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c8596a686 cs:33 sp:7ed4c119f8e8 ax:ffffffffff600000 si:7ed4c119fe08 di:ffffffffff600000 [10962445.739984] exe[722635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c8596a686 cs:33 sp:7ed4c119f8e8 ax:ffffffffff600000 si:7ed4c119fe08 di:ffffffffff600000 [10962445.785545] exe[722635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c8596a686 cs:33 sp:7ed4c119f8e8 ax:ffffffffff600000 si:7ed4c119fe08 di:ffffffffff600000 [10962595.002903] exe[623340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f5ff58686 cs:33 sp:7f11e6fdc8e8 ax:ffffffffff600000 si:7f11e6fdce08 di:ffffffffff600000 [10962872.251454] exe[725893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644a7168686 cs:33 sp:7f756d9ed8e8 ax:ffffffffff600000 si:7f756d9ede08 di:ffffffffff600000 [10962872.533460] exe[651985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644a7168686 cs:33 sp:7f756d9ed8e8 ax:ffffffffff600000 si:7f756d9ede08 di:ffffffffff600000 [10962872.744371] exe[710629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644a7168686 cs:33 sp:7f756d9ed8e8 ax:ffffffffff600000 si:7f756d9ede08 di:ffffffffff600000 [10962873.067435] exe[723431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644a7168686 cs:33 sp:7f756d9ed8e8 ax:ffffffffff600000 si:7f756d9ede08 di:ffffffffff600000 [10963176.262208] umip_printk: 3 callbacks suppressed [10963176.262213] umip: exe[674819] ip:200000c0 sp:20000508: SLDT instruction cannot be used by applications. [10963176.321700] umip: exe[674819] ip:200000c0 sp:20000508: SLDT instruction cannot be used by applications. [10963176.391502] umip: exe[674819] ip:200000c0 sp:20000508: SLDT instruction cannot be used by applications. [10963594.689704] exe[752462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963594.848568] exe[741269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963595.040303] exe[752283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963595.276233] exe[758417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963595.435253] exe[686502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963595.630733] exe[752283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963595.798799] exe[752282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10963595.919134] exe[738443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e12bfd686 cs:33 sp:7ebe7ee6e8e8 ax:ffffffffff600000 si:7ebe7ee6ee08 di:ffffffffff600000 [10964751.008503] exe[785334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca04bf3686 cs:33 sp:7ff95c06f8e8 ax:ffffffffff600000 si:7ff95c06fe08 di:ffffffffff600000 [10964751.220834] exe[786046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca04bf3686 cs:33 sp:7ff95c04e8e8 ax:ffffffffff600000 si:7ff95c04ee08 di:ffffffffff600000 [10964751.401696] exe[768948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca04bf3686 cs:33 sp:7ff95c04e8e8 ax:ffffffffff600000 si:7ff95c04ee08 di:ffffffffff600000 [10964900.602155] exe[787221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d85b9a3686 cs:33 sp:7ee552e3ff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10964900.683404] exe[785685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d85b9a3686 cs:33 sp:7ee552e3ff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10964900.767298] exe[759143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d85b9a3686 cs:33 sp:7ee552e3ff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10964900.767747] exe[758039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d85b9a3686 cs:33 sp:7ee5529fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [10967744.935021] exe[832441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bced25686 cs:33 sp:7f83ffa628e8 ax:ffffffffff600000 si:7f83ffa62e08 di:ffffffffff600000 [10967745.050440] exe[816880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bced25686 cs:33 sp:7f83ffa418e8 ax:ffffffffff600000 si:7f83ffa41e08 di:ffffffffff600000 [10967745.168215] exe[831037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bced25686 cs:33 sp:7f83ffa418e8 ax:ffffffffff600000 si:7f83ffa41e08 di:ffffffffff600000 [10968456.322836] exe[909627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f966c63686 cs:33 sp:7f36dc1fe8e8 ax:ffffffffff600000 si:7f36dc1fee08 di:ffffffffff600000 [10968457.050782] exe[913783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f966c63686 cs:33 sp:7f36dc1fe8e8 ax:ffffffffff600000 si:7f36dc1fee08 di:ffffffffff600000 [10968457.129329] exe[913783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f966c63686 cs:33 sp:7f36dc1dd8e8 ax:ffffffffff600000 si:7f36dc1dde08 di:ffffffffff600000 [10972147.671285] exe[985979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56399bddd686 cs:33 sp:7f161c1d48e8 ax:ffffffffff600000 si:7f161c1d4e08 di:ffffffffff600000 [10972147.802668] exe[988448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56399bddd686 cs:33 sp:7f161c1d48e8 ax:ffffffffff600000 si:7f161c1d4e08 di:ffffffffff600000 [10972147.873704] exe[24618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56399bddd686 cs:33 sp:7f161c1b38e8 ax:ffffffffff600000 si:7f161c1b3e08 di:ffffffffff600000 [10972149.089655] exe[987258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972149.137369] exe[8101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972149.240292] exe[987258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972149.338712] exe[980622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972149.407232] exe[985484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972149.518623] exe[981446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972149.568645] exe[8101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972152.704625] warn_bad_vsyscall: 53 callbacks suppressed [10972152.704629] exe[982502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972152.828951] exe[985439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972152.961838] exe[985953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.084403] exe[24657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.149743] exe[8094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.201115] exe[8102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.315862] exe[985508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.451600] exe[982386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.593666] exe[985534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972153.619834] exe[985502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76faddd8e8 ax:ffffffffff600000 si:7f76faddde08 di:ffffffffff600000 [10972157.750045] warn_bad_vsyscall: 63 callbacks suppressed [10972157.750048] exe[982502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972157.845280] exe[982274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972157.941679] exe[985560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.031835] exe[985979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.110905] exe[982476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.216355] exe[4538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.237913] exe[4538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.260600] exe[4538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.286771] exe[4538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972158.327831] exe[4538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972163.107843] warn_bad_vsyscall: 75 callbacks suppressed [10972163.107847] exe[18260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972163.245501] exe[24618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972163.357515] exe[985136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972163.494870] exe[24806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972163.586020] exe[24618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10972163.697230] exe[981114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10972163.697446] exe[3983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972164.196360] exe[980832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972164.300462] exe[981118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972164.385157] exe[980511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.126309] warn_bad_vsyscall: 102 callbacks suppressed [10972168.126312] exe[981046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.216301] exe[974846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.278328] exe[985979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.367115] exe[982077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.430983] exe[992840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.465719] exe[8103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2278e8 ax:ffffffffff600000 si:7f76fb227e08 di:ffffffffff600000 [10972168.547520] exe[992840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10972168.650746] exe[982274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.784746] exe[18646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972168.869571] exe[972486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.170795] warn_bad_vsyscall: 221 callbacks suppressed [10972173.170799] exe[987156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.206638] exe[24619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.332329] exe[980416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.429688] exe[985405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.457814] exe[24618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10972173.553261] exe[18646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.554770] exe[987327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10972173.677837] exe[972578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.757783] exe[987775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972173.784728] exe[18276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.189762] warn_bad_vsyscall: 120 callbacks suppressed [10972178.189766] exe[981396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.192865] exe[981609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10972178.491161] exe[980617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.583263] exe[981434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.679581] exe[980617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.786328] exe[974989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.887041] exe[972969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972178.968739] exe[24621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2278e8 ax:ffffffffff600000 si:7f76fb227e08 di:ffffffffff600000 [10972179.055122] exe[981444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2698e8 ax:ffffffffff600000 si:7f76fb269e08 di:ffffffffff600000 [10972179.165114] exe[982903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eac3031686 cs:33 sp:7f76fb2488e8 ax:ffffffffff600000 si:7f76fb248e08 di:ffffffffff600000 [10973439.720293] warn_bad_vsyscall: 102 callbacks suppressed [10973439.720296] exe[23637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa4be09686 cs:33 sp:7f7415ac08e8 ax:ffffffffff600000 si:7f7415ac0e08 di:ffffffffff600000 [10973439.815962] exe[68111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa4be09686 cs:33 sp:7f7415ac08e8 ax:ffffffffff600000 si:7f7415ac0e08 di:ffffffffff600000 [10973439.849184] exe[68111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa4be09686 cs:33 sp:7f7415ac08e8 ax:ffffffffff600000 si:7f7415ac0e08 di:ffffffffff600000 [10973439.965333] exe[985461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa4be09686 cs:33 sp:7f7415ac08e8 ax:ffffffffff600000 si:7f7415ac0e08 di:ffffffffff600000 [10976570.237100] exe[174763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.400199] exe[182719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.771643] exe[181036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.802628] exe[172482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.845981] exe[174763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.876633] exe[181036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.908499] exe[172482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.940609] exe[172482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976573.975458] exe[172482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10976574.007241] exe[182719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e305b7686 cs:33 sp:7eddd91fe8e8 ax:ffffffffff600000 si:7eddd91fee08 di:ffffffffff600000 [10977868.251628] warn_bad_vsyscall: 43 callbacks suppressed [10977868.251647] exe[191811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557aae35c686 cs:33 sp:7f249d773f88 ax:ffffffffff600000 si:20000c40 di:ffffffffff600000 [10977869.094201] exe[198883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557aae35c686 cs:33 sp:7f249d710f88 ax:ffffffffff600000 si:20000c40 di:ffffffffff600000 [10977870.079875] exe[230319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557aae35c686 cs:33 sp:7f249d752f88 ax:ffffffffff600000 si:20000c40 di:ffffffffff600000 [10979417.003763] exe[185302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebfc44c3e8 cs:33 sp:7ead9707cf90 ax:7ead9707d020 si:ffffffffff600000 di:55ebfc506019 [10979417.145663] exe[193397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebfc44c3e8 cs:33 sp:7ead9707cf90 ax:7ead9707d020 si:ffffffffff600000 di:55ebfc506019 [10979417.290891] exe[259240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebfc44c3e8 cs:33 sp:7ead96bfef90 ax:7ead96bff020 si:ffffffffff600000 di:55ebfc506019 [10980849.480169] exe[275223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55706fc81686 cs:33 sp:7f1e871fef88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980849.574606] exe[306186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55706fc81686 cs:33 sp:7f1e871ddf88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980849.663839] exe[272841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55706fc81686 cs:33 sp:7f1e871fef88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980849.698366] exe[306763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55706fc81686 cs:33 sp:7f1e871ddf88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980855.859253] exe[306564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980855.929814] exe[272298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980855.995904] exe[306707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.085451] exe[273747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.137468] exe[306765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbda2f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.150651] exe[273747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.198758] exe[272841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbda2f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.222426] exe[277756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.270742] exe[271778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbda2f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10980856.278257] exe[273756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c31ee686 cs:33 sp:7fd2fd0e0f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981287.051574] warn_bad_vsyscall: 21 callbacks suppressed [10981287.051577] exe[331443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555efc692686 cs:33 sp:7fecead97f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981301.835921] exe[325553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba0b0bf686 cs:33 sp:7f79c74a9f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981310.236487] exe[325462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b43bfa6686 cs:33 sp:7f0b801faf88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981310.988182] exe[278224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559940bca686 cs:33 sp:7ea333f71f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981314.827313] exe[313312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648e56a0686 cs:33 sp:7f3c9b080f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981321.484390] exe[333773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562603f5b686 cs:33 sp:7f3fde6cef88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981321.699649] exe[243026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ae39e686 cs:33 sp:7f82d307af88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981344.790413] exe[331956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c626e4686 cs:33 sp:7ee5c38c5f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981356.055790] exe[314128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acc45e4686 cs:33 sp:7f53b06f2f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981526.763832] exe[325350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2981a8686 cs:33 sp:7ea10d375f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981531.380826] exe[311823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b31ba79686 cs:33 sp:7f2953774f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10981544.098334] exe[279055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e80a17686 cs:33 sp:7f9cde04f8e8 ax:ffffffffff600000 si:7f9cde04fe08 di:ffffffffff600000 [10981544.199388] exe[279170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e80a17686 cs:33 sp:7f9cde02e8e8 ax:ffffffffff600000 si:7f9cde02ee08 di:ffffffffff600000 [10981544.298292] exe[314017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e80a17686 cs:33 sp:7f9cde04f8e8 ax:ffffffffff600000 si:7f9cde04fe08 di:ffffffffff600000 [10981544.346713] exe[333632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e80a17686 cs:33 sp:7f9cde02e8e8 ax:ffffffffff600000 si:7f9cde02ee08 di:ffffffffff600000 [10981822.951061] exe[341989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdc904d686 cs:33 sp:7ecf1f7fef88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10982026.149202] exe[314705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab5cff88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.366443] exe[333887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.400010] exe[333887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.436795] exe[314705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.465693] exe[314705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.494208] exe[333887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.524062] exe[333888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.557953] exe[337246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.588505] exe[345633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982026.618064] exe[335830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfef6b5686 cs:33 sp:7ee6ab56cf88 ax:ffffffffff600000 si:200045c0 di:ffffffffff600000 [10982149.486006] warn_bad_vsyscall: 25 callbacks suppressed [10982149.486011] exe[330980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbda2f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10982149.576366] exe[271746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbda2f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10982149.614756] exe[329706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbd81f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10982149.714667] exe[330980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564471a8b686 cs:33 sp:7f00fbd81f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10983244.995831] exe[413324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d68b6686 cs:33 sp:7fda61334f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [10983648.966560] exe[402644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d7e8b5686 cs:33 sp:7f476d5ed8e8 ax:ffffffffff600000 si:7f476d5ede08 di:ffffffffff600000 [10983649.036872] exe[404893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d7e8b5686 cs:33 sp:7f476d5ed8e8 ax:ffffffffff600000 si:7f476d5ede08 di:ffffffffff600000 [10983651.941246] exe[425566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d7e8b5686 cs:33 sp:7f476d5ed8e8 ax:ffffffffff600000 si:7f476d5ede08 di:ffffffffff600000 [10983915.157961] exe[415678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b70340d3e8 cs:33 sp:7ee0075fef90 ax:7ee0075ff020 si:ffffffffff600000 di:55b7034c7019 [10983915.217033] exe[436968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b70340d3e8 cs:33 sp:7ee0075fef90 ax:7ee0075ff020 si:ffffffffff600000 di:55b7034c7019 [10983916.011181] exe[421980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b70340d3e8 cs:33 sp:7ee0075fef90 ax:7ee0075ff020 si:ffffffffff600000 di:55b7034c7019 [10983916.033524] exe[415678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b70340d3e8 cs:33 sp:7ee0075ddf90 ax:7ee0075de020 si:ffffffffff600000 di:55b7034c7019 [10983919.468513] exe[436968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983919.536167] exe[425892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983919.585281] exe[422012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983920.321419] exe[418278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983921.162381] exe[422144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983921.214021] exe[422816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983922.025840] exe[415786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983922.072473] exe[418278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983922.145716] exe[419279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983922.942820] exe[425892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983923.825096] exe[416359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983924.680972] exe[415897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983924.721122] exe[415678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983925.547863] exe[415786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983925.596913] exe[422144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983926.420507] exe[415678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983926.465452] exe[422144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983927.290428] exe[418278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983927.352454] exe[419279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983927.417291] exe[416359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10983927.485442] exe[415897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed101c43e8 cs:33 sp:7ee216a4bf90 ax:7ee216a4c020 si:ffffffffff600000 di:55ed1027e019 [10984948.401476] exe[438950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576909e03e8 cs:33 sp:7f06fdfa6f90 ax:7f06fdfa7020 si:ffffffffff600000 di:557690a9a019 [10984948.574497] exe[453435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576909e03e8 cs:33 sp:7f06fdfa6f90 ax:7f06fdfa7020 si:ffffffffff600000 di:557690a9a019 [10984949.262021] exe[432322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576909e03e8 cs:33 sp:7f06fdfa6f90 ax:7f06fdfa7020 si:ffffffffff600000 di:557690a9a019 [10985972.168713] exe[464502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1d2590686 cs:33 sp:7eff4064c8e8 ax:ffffffffff600000 si:7eff4064ce08 di:ffffffffff600000 [10985972.268628] exe[411985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1d2590686 cs:33 sp:7eff4064c8e8 ax:ffffffffff600000 si:7eff4064ce08 di:ffffffffff600000 [10985972.362253] exe[472176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1d2590686 cs:33 sp:7eff4064c8e8 ax:ffffffffff600000 si:7eff4064ce08 di:ffffffffff600000 [10986458.599349] exe[482591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef4118686 cs:33 sp:7f13426518e8 ax:ffffffffff600000 si:7f1342651e08 di:ffffffffff600000 [10986458.714966] exe[482749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef4118686 cs:33 sp:7f13426518e8 ax:ffffffffff600000 si:7f1342651e08 di:ffffffffff600000 [10986458.837883] exe[482538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef4118686 cs:33 sp:7f13426518e8 ax:ffffffffff600000 si:7f1342651e08 di:ffffffffff600000 [10986458.905541] exe[482750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef4118686 cs:33 sp:7f13426308e8 ax:ffffffffff600000 si:7f1342630e08 di:ffffffffff600000 [10986460.436239] exe[485016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e5d5d6686 cs:33 sp:7f818cab98e8 ax:ffffffffff600000 si:7f818cab9e08 di:ffffffffff600000 [10986460.558091] exe[482727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e5d5d6686 cs:33 sp:7f818cab98e8 ax:ffffffffff600000 si:7f818cab9e08 di:ffffffffff600000 [10986460.656593] exe[482547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e5d5d6686 cs:33 sp:7f818cab98e8 ax:ffffffffff600000 si:7f818cab9e08 di:ffffffffff600000 [10986460.775184] exe[482607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e5d5d6686 cs:33 sp:7f818cab98e8 ax:ffffffffff600000 si:7f818cab9e08 di:ffffffffff600000 [10986460.885647] exe[482727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e5d5d6686 cs:33 sp:7f818cab98e8 ax:ffffffffff600000 si:7f818cab9e08 di:ffffffffff600000 [10986461.131329] exe[487649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e5d5d6686 cs:33 sp:7f818cab98e8 ax:ffffffffff600000 si:7f818cab9e08 di:ffffffffff600000 [10987680.590926] warn_bad_vsyscall: 2 callbacks suppressed [10987680.590929] exe[567962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56195367e686 cs:33 sp:7ebbf86828e8 ax:ffffffffff600000 si:7ebbf8682e08 di:ffffffffff600000 [10987680.672732] exe[568059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56195367e686 cs:33 sp:7ebbf86828e8 ax:ffffffffff600000 si:7ebbf8682e08 di:ffffffffff600000 [10987680.697646] exe[567768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56195367e686 cs:33 sp:7ebbf86618e8 ax:ffffffffff600000 si:7ebbf8661e08 di:ffffffffff600000 [10988148.721167] exe[533500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dab76ed391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40802000 [10988148.751100] exe[533665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dab76ed391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40802000 [10988148.758924] exe[553601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dab76ed391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40802000 [10988148.791607] exe[533500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dab76ed391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40802000 [10988148.804127] exe[553427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dab76ed391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40802000 [10988548.694466] exe[584035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f69b4a5686 cs:33 sp:7f286dc5e8e8 ax:ffffffffff600000 si:7f286dc5ee08 di:ffffffffff600000 [10988548.773941] exe[584188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f69b4a5686 cs:33 sp:7f286dc5e8e8 ax:ffffffffff600000 si:7f286dc5ee08 di:ffffffffff600000 [10988548.799828] exe[584188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f69b4a5686 cs:33 sp:7f286dc5e8e8 ax:ffffffffff600000 si:7f286dc5ee08 di:ffffffffff600000 [10988548.882273] exe[584043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f69b4a5686 cs:33 sp:7f286dc5e8e8 ax:ffffffffff600000 si:7f286dc5ee08 di:ffffffffff600000 [10988925.600319] exe[585352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87aca9686 cs:33 sp:7f325d432f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10988925.750488] exe[584833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87aca9686 cs:33 sp:7f325cffef88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10988925.880950] exe[561212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87aca9686 cs:33 sp:7f325d432f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [10991793.924752] exe[662129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c28885686 cs:33 sp:7f73a68ccf88 ax:ffffffffff600000 si:20002f00 di:ffffffffff600000 [10991793.993752] exe[662163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c28885686 cs:33 sp:7f73a68ccf88 ax:ffffffffff600000 si:20002f00 di:ffffffffff600000 [10991794.076664] exe[627998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c28885686 cs:33 sp:7f73a68ccf88 ax:ffffffffff600000 si:20002f00 di:ffffffffff600000 [10991794.078102] exe[662151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c28885686 cs:33 sp:7f73a68abf88 ax:ffffffffff600000 si:20002f00 di:ffffffffff600000 [10991999.490200] exe[628071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca5133e8 cs:33 sp:7fa0bdfe5f90 ax:7fa0bdfe6020 si:ffffffffff600000 di:5593ca5cd019 [10991999.573426] exe[658046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca5133e8 cs:33 sp:7fa0bdfe5f90 ax:7fa0bdfe6020 si:ffffffffff600000 di:5593ca5cd019 [10991999.692540] exe[627912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca5133e8 cs:33 sp:7fa0bdfe5f90 ax:7fa0bdfe6020 si:ffffffffff600000 di:5593ca5cd019 [10993171.113407] exe[681484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556208e61391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:400c0000 [10993172.854381] exe[615473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556208e61391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:400c0000 [10993174.322326] exe[679174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556208e61391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:400c0000 [10993297.472325] exe[644229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfe5f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.556723] exe[662132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfe5f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.613259] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.634677] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.665144] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.691952] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.713160] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.737657] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.760435] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10993297.783289] exe[628120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593ca562686 cs:33 sp:7fa0bdfc4f88 ax:ffffffffff600000 si:20000380 di:ffffffffff600000 [10994205.388137] warn_bad_vsyscall: 57 callbacks suppressed [10994205.388140] exe[720056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa586cf88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.495706] exe[719696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.527653] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.549544] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.571237] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.593043] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.615084] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.635906] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.657786] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994205.679904] exe[727281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c10686 cs:33 sp:7f5aa582af88 ax:ffffffffff600000 si:20002700 di:ffffffffff600000 [10994415.401275] warn_bad_vsyscall: 25 callbacks suppressed [10994415.401279] exe[723629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7c18e8 ax:ffffffffff600000 si:7fb60a7c1e08 di:ffffffffff600000 [10994415.542269] exe[738316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7c18e8 ax:ffffffffff600000 si:7fb60a7c1e08 di:ffffffffff600000 [10994415.646756] exe[746516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.673163] exe[746516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.702272] exe[746516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.735182] exe[746967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.770978] exe[729677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.802116] exe[729677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.832588] exe[729677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10994415.867289] exe[745010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586f7784686 cs:33 sp:7fb60a7a08e8 ax:ffffffffff600000 si:7fb60a7a0e08 di:ffffffffff600000 [10995489.604495] warn_bad_vsyscall: 57 callbacks suppressed [10995489.604498] exe[762485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060270c3e8 cs:33 sp:7ec3c4c67f90 ax:7ec3c4c68020 si:ffffffffff600000 di:5606027c6019 [10995489.788072] exe[755964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060270c3e8 cs:33 sp:7ec3c4c46f90 ax:7ec3c4c47020 si:ffffffffff600000 di:5606027c6019 [10995489.941112] exe[768425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060270c3e8 cs:33 sp:7ec3c4c67f90 ax:7ec3c4c68020 si:ffffffffff600000 di:5606027c6019 [10995489.994457] exe[755965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56060270c3e8 cs:33 sp:7ec3c4c67f90 ax:7ec3c4c68020 si:ffffffffff600000 di:5606027c6019 [10996030.543155] exe[791293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637a010d391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996032.641098] exe[758966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad87edd391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996033.049168] exe[707633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55705aa46391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996033.104874] exe[706531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ea20c7391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996033.174394] exe[758966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad87edd391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996036.561026] exe[772435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560242a07391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996036.572978] exe[724279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b0f7db391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996036.810517] exe[791992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ccb236391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996037.589851] exe[793449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56332c575391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996037.726412] exe[784867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8b19cb391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996037.912738] exe[778723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a1223391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996038.066244] exe[752196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a1223391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996038.311971] exe[773461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560242a07391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996038.527085] exe[783877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604e2250391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996038.725337] exe[761476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b27dfda391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996041.750253] warn_bad_vsyscall: 13 callbacks suppressed [10996041.750257] exe[772839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560242a07391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996042.467661] exe[726871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b0f7db391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996373.760207] exe[704287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc002a9391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996374.091966] exe[792155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc002a9391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996374.269853] exe[774442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcfe0a7391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996374.390951] exe[712978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561587f90391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996374.675706] exe[710178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcfe0a7391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996404.039919] exe[774078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c21391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996404.096033] exe[754750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648ab385391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996404.977410] exe[750538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55927ae26391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996419.818332] exe[760507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b237c21391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996420.247215] exe[755894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a601c8391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996460.333636] exe[799237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c3a541391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996460.449213] exe[793329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c3a541391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996461.040569] exe[790855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c3a541391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996462.090248] exe[797256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c3a541391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996463.532525] exe[800541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d1ae4a391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996501.266332] exe[795925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfed86a391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996501.750939] exe[799699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56521eb3a391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996502.066279] exe[799740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56521eb3a391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996502.277938] exe[795024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b5c43391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996502.413477] exe[797084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b5c43391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996538.583589] exe[797241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6d42dc391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996538.729617] exe[797241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6d42dc391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996539.012809] exe[755984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f44743391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996539.784222] exe[762948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebd9636391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996540.134662] exe[762767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebd9636391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996623.134309] exe[711336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648ab374686 cs:33 sp:7fd2aa25ef88 ax:ffffffffff600000 si:20003500 di:ffffffffff600000 [10996623.284644] exe[711258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648ab374686 cs:33 sp:7fd2aa25ef88 ax:ffffffffff600000 si:20003500 di:ffffffffff600000 [10996623.968703] exe[755894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648ab374686 cs:33 sp:7fd2aa25ef88 ax:ffffffffff600000 si:20003500 di:ffffffffff600000 [10996641.270707] exe[734721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74ba87391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [10996641.492318] exe[717889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74ba87391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996641.568332] exe[734721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74ba87391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996641.738700] exe[801561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e375cd7391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996641.921308] exe[717889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74ba87391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10996893.879933] exe[844383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1ac0391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997229.589964] exe[861297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb8fcd5391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997241.933234] exe[868932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564884b71391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997304.625401] exe[864087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4e11ad391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997389.940765] exe[824819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff6c07f391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997471.540680] exe[875632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecd59f1391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997498.979276] exe[877550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d99171391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10997503.388657] exe[851792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601133f4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10998870.897598] exe[927095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56228a6ee391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10998871.475555] exe[892990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634a238b391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10998886.092962] exe[884644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbba3d3391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10998916.703767] exe[912404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8f82f5391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10999208.635388] exe[929969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb8fcd5391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10999217.160981] exe[927862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564884b71391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10999247.868520] exe[931869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4e11ad391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10999296.760089] exe[936371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56228a6dd686 cs:33 sp:7f82599138e8 ax:ffffffffff600000 si:7f8259913e08 di:ffffffffff600000 [10999297.319914] exe[936393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56228a6dd686 cs:33 sp:7f82599138e8 ax:ffffffffff600000 si:7f8259913e08 di:ffffffffff600000 [10999297.703770] exe[936224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56228a6dd686 cs:33 sp:7f82599138e8 ax:ffffffffff600000 si:7f8259913e08 di:ffffffffff600000 [10999348.274577] exe[929659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6f9c2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [10999891.566140] exe[895969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556812cb686 cs:33 sp:7f7bb5090f88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [11000465.393874] exe[965821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fa2e4d686 cs:33 sp:7f3169bbbf88 ax:ffffffffff600000 si:20002140 di:ffffffffff600000 [11000499.028687] exe[966220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f24314428e8 ax:ffffffffff600000 si:7f2431442e08 di:ffffffffff600000 [11000499.071475] exe[966544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f24314428e8 ax:ffffffffff600000 si:7f2431442e08 di:ffffffffff600000 [11000499.876393] exe[967310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f24314428e8 ax:ffffffffff600000 si:7f2431442e08 di:ffffffffff600000 [11000499.917242] exe[966352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f24314428e8 ax:ffffffffff600000 si:7f2431442e08 di:ffffffffff600000 [11000641.378960] exe[983941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1ed58686 cs:33 sp:7fc0dc95ff88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11000641.444291] exe[978997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1ed58686 cs:33 sp:7fc0dc95ff88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11000641.492723] exe[969232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1ed58686 cs:33 sp:7fc0dc95ff88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11000641.726067] exe[981108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa1ed58686 cs:33 sp:7fc0dc95ff88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11000815.353654] exe[992291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a4b162391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11000832.038498] exe[983376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a5187c391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11001440.130917] exe[997995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f2431442f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11001442.702278] exe[980619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f2431442f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11001442.757007] exe[966338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f2431442f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11001446.594985] exe[966466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f2431442f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11002025.777452] exe[8722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dda2ef0686 cs:33 sp:7f8afeb7bf88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11002041.981846] exe[21660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555653f01686 cs:33 sp:7fc4b506bf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11002235.222194] exe[25052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab19800391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11002268.279805] exe[25039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab19800391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11002390.644043] exe[966206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7701cb686 cs:33 sp:7f24314428e8 ax:ffffffffff600000 si:7f2431442e08 di:ffffffffff600000 [11002847.510734] exe[20575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55973a8fe686 cs:33 sp:7f937e3518e8 ax:ffffffffff600000 si:7f937e351e08 di:ffffffffff600000 [11002847.618850] exe[25777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55973a8fe686 cs:33 sp:7f937e3518e8 ax:ffffffffff600000 si:7f937e351e08 di:ffffffffff600000 [11002848.224344] exe[15509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55973a8fe686 cs:33 sp:7f937e3518e8 ax:ffffffffff600000 si:7f937e351e08 di:ffffffffff600000 [11002848.349717] exe[6381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55973a8fe686 cs:33 sp:7f937e3518e8 ax:ffffffffff600000 si:7f937e351e08 di:ffffffffff600000 [11003071.276954] exe[37946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee9bf4686 cs:33 sp:7ec252d218e8 ax:ffffffffff600000 si:7ec252d21e08 di:ffffffffff600000 [11003071.406256] exe[38511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee9bf4686 cs:33 sp:7ec252d218e8 ax:ffffffffff600000 si:7ec252d21e08 di:ffffffffff600000 [11003071.541595] exe[37145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee9bf4686 cs:33 sp:7ec252d218e8 ax:ffffffffff600000 si:7ec252d21e08 di:ffffffffff600000 [11003071.684977] exe[22211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee9bf4686 cs:33 sp:7ec252d218e8 ax:ffffffffff600000 si:7ec252d21e08 di:ffffffffff600000 [11003148.891738] exe[997119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d30a392391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11003180.204483] exe[35468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555653f12391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11003278.067823] exe[990068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb5d72391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11003315.812603] exe[987375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4b5689391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11003469.921899] exe[27699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f829a1391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11003491.492739] exe[35834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd250d391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11003772.143319] exe[10874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e84aff8686 cs:33 sp:7f096dad98e8 ax:ffffffffff600000 si:7f096dad9e08 di:ffffffffff600000 [11003772.304137] exe[30825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e84aff8686 cs:33 sp:7f096dad98e8 ax:ffffffffff600000 si:7f096dad9e08 di:ffffffffff600000 [11003772.430149] exe[51114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e84aff8686 cs:33 sp:7f096dad98e8 ax:ffffffffff600000 si:7f096dad9e08 di:ffffffffff600000 [11003772.610594] exe[51129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e84aff8686 cs:33 sp:7f096dad98e8 ax:ffffffffff600000 si:7f096dad9e08 di:ffffffffff600000 [11004083.138634] exe[69424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b8b7b7686 cs:33 sp:7fe645d848e8 ax:ffffffffff600000 si:7fe645d84e08 di:ffffffffff600000 [11004436.721672] exe[68667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564557c2e686 cs:33 sp:7ff9022668e8 ax:ffffffffff600000 si:7ff902266e08 di:ffffffffff600000 [11004436.801091] exe[68623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564557c2e686 cs:33 sp:7ff9022668e8 ax:ffffffffff600000 si:7ff902266e08 di:ffffffffff600000 [11004436.901344] exe[69206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564557c2e686 cs:33 sp:7ff9022668e8 ax:ffffffffff600000 si:7ff902266e08 di:ffffffffff600000 [11004436.965684] exe[68667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34350686 cs:33 sp:7f1f2e9478e8 ax:ffffffffff600000 si:7f1f2e947e08 di:ffffffffff600000 [11004436.984440] exe[68561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564557c2e686 cs:33 sp:7ff9022668e8 ax:ffffffffff600000 si:7ff902266e08 di:ffffffffff600000 [11004437.034885] exe[69003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34350686 cs:33 sp:7f1f2e9478e8 ax:ffffffffff600000 si:7f1f2e947e08 di:ffffffffff600000 [11004437.119376] exe[72502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34350686 cs:33 sp:7f1f2e9478e8 ax:ffffffffff600000 si:7f1f2e947e08 di:ffffffffff600000 [11004438.736269] exe[64525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560bfb755686 cs:33 sp:7ed596eab8e8 ax:ffffffffff600000 si:7ed596eabe08 di:ffffffffff600000 [11005491.124691] exe[113056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5618168e0686 cs:33 sp:7f4e80bf38e8 ax:ffffffffff600000 si:7f4e80bf3e08 di:ffffffffff600000 [11005974.250034] exe[125155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34350686 cs:33 sp:7f1f2e9478e8 ax:ffffffffff600000 si:7f1f2e947e08 di:ffffffffff600000 [11006014.985257] exe[125005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0fc5a3391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11006041.913592] exe[130879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b8b7c8391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11006472.022099] exe[135345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560bfb766391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11006497.825116] exe[133872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a235473391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11006711.708018] exe[143808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562eee83e391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11006736.571102] exe[145670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55802b283391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8008000 [11007929.775864] exe[205979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f40495391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:92024000 [11007930.697270] exe[215255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f40495391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:92024000 [11009840.060099] exe[281609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598728c7686 cs:33 sp:7ec591309f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11009840.112292] exe[281609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598728c7686 cs:33 sp:7ec591309f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11009840.171375] exe[281468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598728c7686 cs:33 sp:7ec5912e8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11010041.551008] exe[278972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3a60d73e8 cs:33 sp:7f8fe2298f90 ax:7f8fe2299020 si:ffffffffff600000 di:55a3a6191019 [11010041.624587] exe[278371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3a60d73e8 cs:33 sp:7f8fe2298f90 ax:7f8fe2299020 si:ffffffffff600000 di:55a3a6191019 [11010041.700133] exe[278371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3a60d73e8 cs:33 sp:7f8fe2298f90 ax:7f8fe2299020 si:ffffffffff600000 di:55a3a6191019 [11010304.697997] exe[250813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563db4f063e8 cs:33 sp:7f5818a7ef90 ax:7f5818a7f020 si:ffffffffff600000 di:563db4fc0019 [11011153.585160] exe[281902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598728c7686 cs:33 sp:7ec591309f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11011153.652537] exe[281458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598728c7686 cs:33 sp:7ec591309f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11011153.724306] exe[281458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598728c7686 cs:33 sp:7ec591309f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11011760.259660] exe[325761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9868e8 ax:ffffffffff600000 si:7f64fc986e08 di:ffffffffff600000 [11011760.327745] exe[325761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9868e8 ax:ffffffffff600000 si:7f64fc986e08 di:ffffffffff600000 [11011760.404081] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.427402] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.448757] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.472295] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.505342] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.526429] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.548248] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011760.569185] exe[325818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d70543f686 cs:33 sp:7f64fc9658e8 ax:ffffffffff600000 si:7f64fc965e08 di:ffffffffff600000 [11011961.749246] warn_bad_vsyscall: 57 callbacks suppressed [11011961.749249] exe[278567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3a60d73e8 cs:33 sp:7f8fe2298f90 ax:7f8fe2299020 si:ffffffffff600000 di:55a3a6191019 [11011961.847836] exe[278763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3a60d73e8 cs:33 sp:7f8fe2256f90 ax:7f8fe2257020 si:ffffffffff600000 di:55a3a6191019 [11012481.099246] exe[345918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f10947686 cs:33 sp:7f2b78fa48e8 ax:ffffffffff600000 si:7f2b78fa4e08 di:ffffffffff600000 [11012481.201230] exe[346710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f10947686 cs:33 sp:7f2b78fa48e8 ax:ffffffffff600000 si:7f2b78fa4e08 di:ffffffffff600000 [11012481.238593] exe[345921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f10947686 cs:33 sp:7f2b78f838e8 ax:ffffffffff600000 si:7f2b78f83e08 di:ffffffffff600000 [11012481.878213] exe[345044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f10947686 cs:33 sp:7f2b78fa48e8 ax:ffffffffff600000 si:7f2b78fa4e08 di:ffffffffff600000 [11015807.706994] exe[450130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bfc125686 cs:33 sp:7eae07d1cf88 ax:ffffffffff600000 si:20007200 di:ffffffffff600000 [11015808.513535] exe[449333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bfc125686 cs:33 sp:7eae07d5ef88 ax:ffffffffff600000 si:20007200 di:ffffffffff600000 [11015809.507882] exe[450066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bfc125686 cs:33 sp:7eae07d1cf88 ax:ffffffffff600000 si:20007200 di:ffffffffff600000 [11016551.257115] exe[467147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c363c686 cs:33 sp:7f152397d8e8 ax:ffffffffff600000 si:7f152397de08 di:ffffffffff600000 [11016551.319142] exe[463798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c363c686 cs:33 sp:7f152397d8e8 ax:ffffffffff600000 si:7f152397de08 di:ffffffffff600000 [11016551.357600] exe[463866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c363c686 cs:33 sp:7f152397d8e8 ax:ffffffffff600000 si:7f152397de08 di:ffffffffff600000 [11016551.444548] exe[464805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c363c686 cs:33 sp:7f152395c8e8 ax:ffffffffff600000 si:7f152395ce08 di:ffffffffff600000 [11016551.446263] exe[464774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647c363c686 cs:33 sp:7f152393b8e8 ax:ffffffffff600000 si:7f152393be08 di:ffffffffff600000 [11018253.063948] exe[525282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56542ee22686 cs:33 sp:7f84401d48e8 ax:ffffffffff600000 si:7f84401d4e08 di:ffffffffff600000 [11018253.211990] exe[525836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56542ee22686 cs:33 sp:7f84401d48e8 ax:ffffffffff600000 si:7f84401d4e08 di:ffffffffff600000 [11018253.343193] exe[506043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56542ee22686 cs:33 sp:7f84401d48e8 ax:ffffffffff600000 si:7f84401d4e08 di:ffffffffff600000 [11020113.238248] exe[664108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c898e8 ax:ffffffffff600000 si:7f2c99c89e08 di:ffffffffff600000 [11020113.485252] exe[626063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.514412] exe[622895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.549871] exe[628458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.579111] exe[628458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.617029] exe[628458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.645120] exe[628458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.676575] exe[629831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.707435] exe[622908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11020113.735333] exe[622908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600ed912686 cs:33 sp:7f2c99c688e8 ax:ffffffffff600000 si:7f2c99c68e08 di:ffffffffff600000 [11022531.450153] warn_bad_vsyscall: 25 callbacks suppressed [11022531.450157] exe[704208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55755dacb3e8 cs:33 sp:7ed764bfef90 ax:7ed764bff020 si:ffffffffff600000 di:55755db85019 [11022531.511988] exe[709058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55755dacb3e8 cs:33 sp:7ed765035f90 ax:7ed765036020 si:ffffffffff600000 di:55755db85019 [11023323.990523] exe[718867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562de0421686 cs:33 sp:7ea87639b8e8 ax:ffffffffff600000 si:7ea87639be08 di:ffffffffff600000 [11023324.035598] exe[718448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562de0421686 cs:33 sp:7ea87639b8e8 ax:ffffffffff600000 si:7ea87639be08 di:ffffffffff600000 [11023324.035617] exe[718867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562de0421686 cs:33 sp:7ea87637a8e8 ax:ffffffffff600000 si:7ea87637ae08 di:ffffffffff600000 [11023324.857237] exe[718455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562de0421686 cs:33 sp:7ea87639b8e8 ax:ffffffffff600000 si:7ea87639be08 di:ffffffffff600000 [11024214.394911] exe[744186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6e23e3686 cs:33 sp:7f93907268e8 ax:ffffffffff600000 si:7f9390726e08 di:ffffffffff600000 [11024215.274032] exe[744186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6e23e3686 cs:33 sp:7f93907268e8 ax:ffffffffff600000 si:7f9390726e08 di:ffffffffff600000 [11024216.153196] exe[749501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6e23e3686 cs:33 sp:7f93907268e8 ax:ffffffffff600000 si:7f9390726e08 di:ffffffffff600000 [11024374.094238] exe[745272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613fb80d686 cs:33 sp:7edb575a38e8 ax:ffffffffff600000 si:7edb575a3e08 di:ffffffffff600000 [11024374.217334] exe[719583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613fb80d686 cs:33 sp:7edb575a38e8 ax:ffffffffff600000 si:7edb575a3e08 di:ffffffffff600000 [11024374.252201] exe[729270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613fb80d686 cs:33 sp:7edb575618e8 ax:ffffffffff600000 si:7edb57561e08 di:ffffffffff600000 [11024374.368765] exe[728600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613fb80d686 cs:33 sp:7edb575a38e8 ax:ffffffffff600000 si:7edb575a3e08 di:ffffffffff600000 [11024598.848394] exe[763427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556965a75686 cs:33 sp:7f356dd64f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11024598.958566] exe[747955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556965a75686 cs:33 sp:7f356dd64f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11024599.727973] exe[748415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556965a75686 cs:33 sp:7f356dd43f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11024875.395315] exe[779766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a9d9e686 cs:33 sp:7f0e78d788e8 ax:ffffffffff600000 si:7f0e78d78e08 di:ffffffffff600000 [11024875.512185] exe[743832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a9d9e686 cs:33 sp:7f0e78d788e8 ax:ffffffffff600000 si:7f0e78d78e08 di:ffffffffff600000 [11024875.629125] exe[779767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a9d9e686 cs:33 sp:7f0e78d788e8 ax:ffffffffff600000 si:7f0e78d78e08 di:ffffffffff600000 [11025166.710223] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025166.753306] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025166.815122] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025166.857876] exe[768639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025166.935435] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025167.025113] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025167.077800] exe[768639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025167.122370] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025167.192204] exe[767220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025167.246590] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025171.754802] warn_bad_vsyscall: 154 callbacks suppressed [11025171.754805] exe[756020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025171.811620] exe[756020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025171.874524] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025171.939699] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025172.133691] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025172.205805] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025172.262171] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025172.320171] exe[756020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025172.388516] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025172.441197] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025176.785464] warn_bad_vsyscall: 121 callbacks suppressed [11025176.785468] exe[746035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025176.849544] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025176.923001] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025177.003661] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025177.061000] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025177.151206] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025177.287321] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025177.399983] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025177.512613] exe[717515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025177.595376] exe[756020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025191.851330] warn_bad_vsyscall: 210 callbacks suppressed [11025191.851334] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025191.912487] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025191.994568] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025199.209440] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025199.276818] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025199.338952] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025203.936846] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025204.037865] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025204.065157] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025204.130548] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025239.893942] exe[717515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025239.942061] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025239.986572] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025241.421377] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025241.466225] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025241.513913] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025243.768371] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025243.811090] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025243.857695] exe[746035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025246.996583] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025247.045514] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.065930] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.086208] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.107638] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.131809] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.153194] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.175875] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.197054] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025247.217903] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025261.702565] warn_bad_vsyscall: 66 callbacks suppressed [11025261.702568] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025261.752103] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025261.794179] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025261.794848] exe[767220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025265.505863] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025265.547755] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025265.590844] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025266.311962] exe[768639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025266.354517] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025266.401399] exe[768639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025269.658106] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025269.704803] exe[717515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025269.725512] exe[717515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025269.772956] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025270.682327] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025270.733833] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025270.757502] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025270.813361] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025270.834417] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025270.856203] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025281.296889] warn_bad_vsyscall: 62 callbacks suppressed [11025281.296893] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025281.341507] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025281.386165] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025281.409727] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025281.915789] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025281.987180] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025282.023521] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025282.024395] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025282.972895] exe[782265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55565ad0c686 cs:33 sp:7ed659358f88 ax:ffffffffff600000 si:20000880 di:ffffffffff600000 [11025283.838074] exe[782263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55565ad0c686 cs:33 sp:7ed659358f88 ax:ffffffffff600000 si:20000880 di:ffffffffff600000 [11025293.973214] warn_bad_vsyscall: 1 callbacks suppressed [11025293.973219] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025294.031535] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025294.085591] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025305.869948] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025305.918184] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025305.957776] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025317.668555] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025317.719249] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025317.764969] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025343.240785] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025343.280027] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025343.325833] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025353.217297] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025353.263854] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025353.316638] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025372.854357] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025372.898440] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025372.941280] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025392.663240] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025392.702299] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025392.745076] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025393.418905] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025393.460517] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025393.504227] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025396.703642] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025396.748133] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025396.792209] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025397.297688] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025410.726255] warn_bad_vsyscall: 2 callbacks suppressed [11025410.726259] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025410.774477] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025410.821580] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025422.682355] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025422.733175] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025422.753907] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025422.799600] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025425.529991] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025425.578108] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025425.623979] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025429.950815] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025430.002483] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025430.048998] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025430.049055] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025435.733122] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025435.776336] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025435.776681] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025435.839017] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025435.864379] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025454.556630] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025454.626592] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025454.685248] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025454.731591] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025454.775701] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025454.818218] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025455.301443] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025455.352666] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025455.396290] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025455.418801] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025474.555380] warn_bad_vsyscall: 63 callbacks suppressed [11025474.555384] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025474.609342] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025474.610245] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025474.670851] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025481.917739] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025481.972312] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025482.034861] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025482.060373] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025488.608403] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025488.650063] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025488.689693] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025497.005062] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025497.850419] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025497.874100] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025497.972914] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025501.602054] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025501.679352] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025501.751513] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025501.813940] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025501.871730] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025501.930599] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025503.867401] warn_bad_vsyscall: 1 callbacks suppressed [11025503.867403] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025503.929968] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025503.981318] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025526.180722] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025526.226430] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025526.276875] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025534.285828] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025534.333820] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025534.355427] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025534.404789] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025534.426616] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025535.589328] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025535.634399] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025535.678453] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025559.035506] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025559.083083] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025559.106240] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025559.157632] exe[758159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025572.636055] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025572.688127] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025572.737219] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025581.551878] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025581.598263] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025581.622838] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025581.664170] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025585.579940] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025630.378049] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025630.422879] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025630.467973] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025659.843543] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025659.883344] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025659.927607] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025692.827936] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025692.868484] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025692.908950] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025693.675528] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025693.720187] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025693.744473] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025693.786559] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025693.811023] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025704.581940] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025704.646742] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025704.690584] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025705.542566] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025705.588807] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025705.613531] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025705.656305] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025717.377470] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025717.415835] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025717.438056] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025717.476547] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025720.659728] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025720.698553] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025720.739125] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025721.979729] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025722.026653] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025722.063772] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025722.783576] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025722.826929] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025722.865616] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025723.472655] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025723.520197] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025723.568379] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025724.119095] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025724.159953] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025724.200932] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025724.247421] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025729.766402] warn_bad_vsyscall: 2 callbacks suppressed [11025729.766406] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025729.828522] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025729.876002] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025736.884458] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025736.935484] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025736.986537] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025743.849026] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025743.909292] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025743.957807] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025743.984765] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025753.967345] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025754.076896] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025754.116286] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025760.090378] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025760.142849] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025760.191767] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025774.804417] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025774.847708] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025774.871689] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025774.912153] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025783.283131] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025783.359145] exe[739144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025783.411100] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025784.588624] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025784.627718] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025784.650836] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025784.690749] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025849.556558] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025849.597541] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025849.597602] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025849.665618] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025849.690550] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025851.802481] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025851.849532] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025851.896457] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025852.003053] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025852.044515] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025856.174683] warn_bad_vsyscall: 4 callbacks suppressed [11025856.174687] exe[758159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025856.223742] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025856.259728] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025856.284668] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025856.525137] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025856.566323] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025856.626834] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025858.530315] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025858.580406] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025858.604965] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025863.251082] warn_bad_vsyscall: 5 callbacks suppressed [11025863.251085] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025863.315262] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025863.374401] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025867.586401] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025867.632426] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025867.654043] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025867.701148] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025876.815900] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025876.891802] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025876.922520] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025876.964993] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025885.246326] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025885.293680] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025885.336908] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025885.526931] exe[756218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025885.579325] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025885.601030] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025885.662204] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025890.407473] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025890.464240] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025890.509524] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025905.439033] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025905.503905] exe[756218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025938.040832] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025938.086857] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025938.110278] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025938.154832] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025938.177375] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025942.276276] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025942.334426] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025942.378280] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025942.379250] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11025959.013117] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025959.050119] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025959.074198] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11025959.139905] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025959.545469] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025959.582487] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025959.628581] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025965.214719] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025965.261543] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025965.319818] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025967.686399] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025967.730223] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025967.753350] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025967.807939] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.531741] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.575876] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.631246] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.652424] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.674178] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.696416] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.718545] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.741639] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.762254] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025971.783010] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025979.302601] warn_bad_vsyscall: 57 callbacks suppressed [11025979.302604] exe[758159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025979.365435] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025979.416616] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.416797] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.477839] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.508650] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.551141] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.572601] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.595168] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.616361] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.638382] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.660688] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11025991.682657] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026017.391587] warn_bad_vsyscall: 30 callbacks suppressed [11026017.391591] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026017.438747] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026017.477524] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026018.723095] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026018.773483] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026018.802021] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026018.858647] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026030.165177] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026030.211791] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026030.255069] exe[756216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026033.673500] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026033.717045] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026033.741157] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026033.789492] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026033.813288] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026043.137287] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026043.241756] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026043.265489] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026048.277458] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026048.317708] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026048.339501] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026048.384261] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.448754] exe[717531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.489073] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.513233] exe[746494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.553195] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.574371] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.595211] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.615818] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.636583] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.657394] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026075.679367] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026086.733351] warn_bad_vsyscall: 62 callbacks suppressed [11026086.733354] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026086.782777] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026086.829775] exe[717517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026115.429839] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026115.476661] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026115.515308] exe[746494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026127.585016] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026127.629173] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026127.678604] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026140.014881] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026140.069472] exe[767220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026140.133745] exe[746035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026144.633397] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026144.673733] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026144.695500] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026144.738331] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026158.200976] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026158.241119] exe[769918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026158.281202] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026161.801647] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026161.844052] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026161.885873] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026161.908698] exe[755332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026162.790569] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026162.848914] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026162.874584] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026164.821479] warn_bad_vsyscall: 1 callbacks suppressed [11026164.821483] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026164.867127] exe[767220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026164.888280] exe[769918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026164.933573] exe[769918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026164.934648] exe[767220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026175.588789] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026175.651060] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026175.704015] exe[717531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.404736] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.449571] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.470916] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.492520] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.514282] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.536164] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.558633] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.580807] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.604218] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026187.625756] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026195.038847] warn_bad_vsyscall: 28 callbacks suppressed [11026195.038850] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026195.102536] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026195.144321] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026195.145260] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026200.213853] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026200.264442] exe[767366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026200.321997] exe[767373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026200.347686] exe[717586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026221.249688] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026221.301705] exe[758781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026221.343544] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026226.082074] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026226.131091] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026226.173446] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026226.174914] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026233.375079] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026233.418799] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026233.464602] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026236.484674] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026236.530116] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026236.553868] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026236.592912] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026239.276215] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026239.332251] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026239.376156] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026250.273802] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026250.332900] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026250.355065] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026250.392646] exe[758159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026250.422700] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026251.228391] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026251.282705] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026251.322516] exe[721054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026251.346653] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026263.691921] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026263.744109] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026263.784208] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026269.240120] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026269.281777] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026269.337133] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026287.046397] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026287.091297] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026287.129386] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026287.130822] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026308.423346] exe[734495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026308.476368] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026308.525233] exe[739122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026312.982205] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026313.025121] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026319.671324] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026319.733232] exe[739122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026319.797553] exe[739122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026320.997091] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026321.076602] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026321.126305] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026327.071112] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026327.117025] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026327.140292] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026327.178521] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026343.003500] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026343.052972] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026343.082225] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026343.123249] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026376.388937] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026376.439212] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026376.498244] exe[721932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.339082] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.380749] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.424937] exe[726079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.817788] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.863097] exe[758226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.915840] exe[758780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026393.940119] exe[758226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026410.463188] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026410.528442] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026410.579728] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026410.604284] exe[767705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026413.988131] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026414.026496] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026414.050809] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026414.093071] exe[721932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026414.369044] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026414.420096] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026418.795551] warn_bad_vsyscall: 1 callbacks suppressed [11026418.795555] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026418.893561] exe[756236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026418.895174] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026418.971505] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026451.358912] exe[729356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026451.414105] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026451.459332] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026451.485777] exe[721050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026451.932751] exe[729356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026451.977930] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026452.018734] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026466.749226] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026466.803574] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026466.850846] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026473.932439] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026473.981105] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026474.025896] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026474.049414] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026492.709684] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026492.757347] exe[729356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026492.803619] exe[756381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026537.579843] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026537.621744] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026537.645351] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026537.685632] exe[729356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026541.955868] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026542.001870] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026542.044907] exe[729356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026542.335602] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026542.378812] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026542.423222] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026553.281335] warn_bad_vsyscall: 4 callbacks suppressed [11026553.281344] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026553.343013] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026553.404932] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026553.842101] exe[758164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026553.885976] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026553.939238] exe[721834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026553.969613] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026559.510178] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026559.568618] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026559.611243] exe[724777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026576.736938] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026576.818076] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026576.873656] exe[765340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026592.368924] exe[758153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026592.415045] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026592.457331] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026593.698346] exe[721047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026593.739342] exe[756381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026593.782425] exe[775517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026594.602026] exe[721812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026594.643048] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026594.681546] exe[756381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026594.720749] exe[758236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026602.421521] warn_bad_vsyscall: 3 callbacks suppressed [11026602.421525] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026602.483000] exe[721771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026602.526016] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026613.541513] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026613.583643] exe[721774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026613.625246] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026613.649482] exe[729356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026627.410755] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026627.500937] exe[721318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026627.560522] exe[721190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026627.589576] exe[756361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026631.185052] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026631.281934] exe[756274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026631.376137] exe[739269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.185249] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026649.256309] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.277420] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.300427] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.321538] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.343464] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.366504] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.387347] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.408933] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026649.430058] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026655.675498] warn_bad_vsyscall: 58 callbacks suppressed [11026655.675502] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026655.764642] exe[767222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026655.857091] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026655.893504] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026656.104515] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026656.164268] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026656.234498] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026658.636168] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026658.748075] exe[805246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026658.806831] exe[767222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026667.668502] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026667.770738] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026667.884070] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026670.160901] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026670.224535] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026670.291710] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026670.317153] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026681.636278] exe[803019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cba4c1f90 ax:7f8cba4c2020 si:ffffffffff600000 di:56099bb03019 [11026681.726487] exe[726772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cba4a0f90 ax:7f8cba4a1020 si:ffffffffff600000 di:56099bb03019 [11026682.169481] exe[805993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cb9fddf90 ax:7f8cb9fde020 si:ffffffffff600000 di:56099bb03019 [11026682.191761] exe[805993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cb9fddf90 ax:7f8cb9fde020 si:ffffffffff600000 di:56099bb03019 [11026682.215434] exe[805993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cb9fddf90 ax:7f8cb9fde020 si:ffffffffff600000 di:56099bb03019 [11026682.241304] exe[805993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cb9fddf90 ax:7f8cb9fde020 si:ffffffffff600000 di:56099bb03019 [11026682.265663] exe[805993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cb9fddf90 ax:7f8cb9fde020 si:ffffffffff600000 di:56099bb03019 [11026682.291291] exe[805993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56099ba493e8 cs:33 sp:7f8cb9fddf90 ax:7f8cb9fde020 si:ffffffffff600000 di:56099bb03019 [11026688.355656] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026688.416500] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026688.483016] exe[767222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026697.866898] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026697.910760] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026697.970116] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026697.998152] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361338e8 ax:ffffffffff600000 si:7f5d36133e08 di:ffffffffff600000 [11026698.614193] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026698.691103] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026698.742455] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026698.770695] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026704.409408] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026704.455367] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026704.501307] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026731.854585] exe[717511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026731.900469] exe[717511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026731.943822] exe[767339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026731.965498] exe[717588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026735.466452] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026735.530891] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026735.577918] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026740.665315] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026740.716088] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026740.742211] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026740.792511] exe[756020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026742.627968] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026742.689008] exe[767222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026742.731271] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026744.681875] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026744.727479] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026744.777187] exe[767222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026748.772588] warn_bad_vsyscall: 4 callbacks suppressed [11026748.772593] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026748.821869] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026748.861786] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026750.366101] exe[746416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026751.220587] exe[805246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026752.068520] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026756.162638] exe[805246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026756.209973] exe[805246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026756.257863] exe[717512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026779.402793] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026779.441289] exe[717584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026779.486828] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026788.110984] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026788.169243] exe[745986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026788.192189] exe[717639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026788.230943] exe[717518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026794.228069] exe[780201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026794.273388] exe[756020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026794.308690] exe[717518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026804.142223] exe[717511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026804.203215] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026804.258513] exe[717521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026804.258937] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361548e8 ax:ffffffffff600000 si:7f5d36154e08 di:ffffffffff600000 [11026805.697910] exe[750558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e117c686 cs:33 sp:7ef45c2408e8 ax:ffffffffff600000 si:7ef45c240e08 di:ffffffffff600000 [11026805.936777] exe[750567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e117c686 cs:33 sp:7ef45c2408e8 ax:ffffffffff600000 si:7ef45c240e08 di:ffffffffff600000 [11026805.937009] exe[750565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e117c686 cs:33 sp:7ef45c21f8e8 ax:ffffffffff600000 si:7ef45c21fe08 di:ffffffffff600000 [11026806.184310] exe[750565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e117c686 cs:33 sp:7ef45c21f8e8 ax:ffffffffff600000 si:7ef45c21fe08 di:ffffffffff600000 [11026806.460448] exe[717511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026806.509854] exe[770052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56405c552686 cs:33 sp:7f5d361758e8 ax:ffffffffff600000 si:7f5d36175e08 di:ffffffffff600000 [11026959.029290] warn_bad_vsyscall: 2 callbacks suppressed [11026959.029294] exe[817449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601681be686 cs:33 sp:7ed0c67fe8e8 ax:ffffffffff600000 si:7ed0c67fee08 di:ffffffffff600000 [11026959.250649] exe[814767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601681be686 cs:33 sp:7ed0c6c248e8 ax:ffffffffff600000 si:7ed0c6c24e08 di:ffffffffff600000 [11026959.304383] exe[814767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601681be686 cs:33 sp:7ed0c6c248e8 ax:ffffffffff600000 si:7ed0c6c24e08 di:ffffffffff600000 [11026959.749300] exe[814729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601681be686 cs:33 sp:7ed0c67fe8e8 ax:ffffffffff600000 si:7ed0c67fee08 di:ffffffffff600000 [11027039.335574] exe[823476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7568ab686 cs:33 sp:7fedabe6c8e8 ax:ffffffffff600000 si:7fedabe6ce08 di:ffffffffff600000 [11027039.404552] exe[823476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7568ab686 cs:33 sp:7fedabe4b8e8 ax:ffffffffff600000 si:7fedabe4be08 di:ffffffffff600000 [11027039.466005] exe[822275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7568ab686 cs:33 sp:7fedabe2a8e8 ax:ffffffffff600000 si:7fedabe2ae08 di:ffffffffff600000 [11027453.661725] exe[825242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f14f21686 cs:33 sp:7f3e0b5fe8e8 ax:ffffffffff600000 si:7f3e0b5fee08 di:ffffffffff600000 [11027453.811322] exe[834891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f14f21686 cs:33 sp:7f3e0b5fe8e8 ax:ffffffffff600000 si:7f3e0b5fee08 di:ffffffffff600000 [11027453.954505] exe[847216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f14f21686 cs:33 sp:7f3e0b5fe8e8 ax:ffffffffff600000 si:7f3e0b5fee08 di:ffffffffff600000 [11029135.781063] exe[881548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558739cc686 cs:33 sp:7f0afe43ef88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [11029136.089492] exe[887578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558739cc686 cs:33 sp:7f0afe43ef88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [11029136.426235] exe[882269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558739cc686 cs:33 sp:7f0afe43ef88 ax:ffffffffff600000 si:200003c0 di:ffffffffff600000 [11029854.637272] exe[903010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e480b5686 cs:33 sp:7fdc6e3d58e8 ax:ffffffffff600000 si:7fdc6e3d5e08 di:ffffffffff600000 [11029854.728588] exe[904007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e480b5686 cs:33 sp:7fdc6e3938e8 ax:ffffffffff600000 si:7fdc6e393e08 di:ffffffffff600000 [11029854.825299] exe[903206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e480b5686 cs:33 sp:7fdc6e3d58e8 ax:ffffffffff600000 si:7fdc6e3d5e08 di:ffffffffff600000 [11030491.356172] exe[897148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c95ff34391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030491.975860] exe[911032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c97188391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030493.440435] exe[913254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a9cdf0391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030495.584864] exe[855606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565c65db391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030549.276772] exe[867558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f61beed686 cs:33 sp:7f92145f9f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030550.061679] exe[867398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f61beed686 cs:33 sp:7f92145f9f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030550.086429] exe[867385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f61beed686 cs:33 sp:7f92145d8f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030550.150428] exe[887250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f61beed686 cs:33 sp:7f92145d8f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030554.494760] exe[887247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030554.543889] exe[851286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030554.594498] exe[898852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030554.646139] exe[892546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030555.413165] exe[867506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030555.459630] exe[867451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030556.271188] exe[864703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030556.330154] exe[851303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [11030557.130447] exe[851404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [11030557.182717] exe[850718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0132a686 cs:33 sp:7f0b85ae5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [11030563.115039] warn_bad_vsyscall: 6 callbacks suppressed [11030563.115053] exe[924476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa6e696391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030573.223947] exe[850884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.310182] exe[887241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be3cf88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.359619] exe[885762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be3cf88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.418006] exe[867385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.473290] exe[850737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.533152] exe[885766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.560729] exe[885963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.627695] exe[850764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.695014] exe[850837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030573.696186] exe[850840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be3cf88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030578.245977] warn_bad_vsyscall: 148 callbacks suppressed [11030578.245981] exe[863341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [11030578.302737] exe[850884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [11030579.109612] exe[867383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [11030579.162227] exe[867365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [11030579.968091] exe[867365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [11030580.040988] exe[867383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [11030580.115109] exe[851297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030580.186878] exe[850727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030580.239186] exe[851297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030580.263322] exe[851297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.281876] warn_bad_vsyscall: 96 callbacks suppressed [11030583.281880] exe[851309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.349345] exe[850720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.408812] exe[858725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.463247] exe[862557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be3cf88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.541174] exe[855653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.605916] exe[862566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.662890] exe[867387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.736069] exe[867396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.806719] exe[850837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030583.856757] exe[887314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.322980] warn_bad_vsyscall: 394 callbacks suppressed [11030588.322983] exe[867513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be3cf88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.383692] exe[863323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.438612] exe[892546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.487642] exe[850740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.533647] exe[850801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.590167] exe[863323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.635850] exe[850801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000340 di:ffffffffff600000 [11030588.791201] exe[867406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [11030588.842605] exe[850662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [11030588.889595] exe[855653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56418f883686 cs:33 sp:7fd95be5df88 ax:ffffffffff600000 si:20000000 di:ffffffffff600000 [11030649.590147] warn_bad_vsyscall: 179 callbacks suppressed [11030649.590150] exe[929210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f18461391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030653.107976] exe[919495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efa2372391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030700.521722] exe[934260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572a244c391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030789.051173] exe[908273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56112d4d4391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030810.212632] exe[937583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598645da391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11030868.952441] exe[935505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f983413e8 cs:33 sp:7f49c7d27f90 ax:7f49c7d28020 si:ffffffffff600000 di:559f983fb019 [11030869.043961] exe[912325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f983413e8 cs:33 sp:7f49c7d27f90 ax:7f49c7d28020 si:ffffffffff600000 di:559f983fb019 [11030869.151333] exe[884904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f983413e8 cs:33 sp:7f49c7d27f90 ax:7f49c7d28020 si:ffffffffff600000 di:559f983fb019 [11030932.163818] exe[714844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bf62e8391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11031011.842723] exe[837473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605d72e8391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11031045.141426] exe[903193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56511e991391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11032373.602732] exe[971555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0d838b686 cs:33 sp:7f4f64f248e8 ax:ffffffffff600000 si:7f4f64f24e08 di:ffffffffff600000 [11032373.729158] exe[961125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0d838b686 cs:33 sp:7f4f64f248e8 ax:ffffffffff600000 si:7f4f64f24e08 di:ffffffffff600000 [11032373.733174] exe[952626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0d838b686 cs:33 sp:7f4f64f038e8 ax:ffffffffff600000 si:7f4f64f03e08 di:ffffffffff600000 [11032373.886015] exe[961125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0d838b686 cs:33 sp:7f4f64f248e8 ax:ffffffffff600000 si:7f4f64f24e08 di:ffffffffff600000 [11032463.972190] exe[969643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dde3a5686 cs:33 sp:7ed294c7ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11032464.054357] exe[971715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dde3a5686 cs:33 sp:7ed294c7ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11032464.078336] exe[969638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dde3a5686 cs:33 sp:7ed294c7ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11032464.137396] exe[971715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dde3a5686 cs:33 sp:7ed294c7ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11032464.158776] exe[969638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564dde3a5686 cs:33 sp:7ed294c7ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [11032490.847510] exe[975284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf871f7686 cs:33 sp:7f99b9f518e8 ax:ffffffffff600000 si:7f99b9f51e08 di:ffffffffff600000 [11032490.986882] exe[952155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf871f7686 cs:33 sp:7f99b9f518e8 ax:ffffffffff600000 si:7f99b9f51e08 di:ffffffffff600000 [11032491.083096] exe[948578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf871f7686 cs:33 sp:7f99b9f518e8 ax:ffffffffff600000 si:7f99b9f51e08 di:ffffffffff600000 [11032825.943053] exe[976583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584ebc3c686 cs:33 sp:7f69c235c8e8 ax:ffffffffff600000 si:7f69c235ce08 di:ffffffffff600000 [11032826.077305] exe[959631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584ebc3c686 cs:33 sp:7f69c235c8e8 ax:ffffffffff600000 si:7f69c235ce08 di:ffffffffff600000 [11032826.392674] exe[964534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584ebc3c686 cs:33 sp:7f69c235c8e8 ax:ffffffffff600000 si:7f69c235ce08 di:ffffffffff600000 [11033872.752819] exe[4313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36ef39391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a000e000 [11035164.166488] exe[105792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f946ac391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1400 [11035164.194087] exe[105780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f946ac391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1400 [11035164.228134] exe[105784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f946ac391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1400 [11035164.229963] exe[105758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f946ac391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1400 [11036685.925839] exe[74890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5644b04d53e8 cs:33 sp:7f62daa3af90 ax:7f62daa3b020 si:ffffffffff600000 di:5644b058f019 [11036968.745149] exe[114911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570825233e8 cs:33 sp:7eaa1cf0cf90 ax:7eaa1cf0d020 si:ffffffffff600000 di:5570825dd019 [11037007.445912] exe[156196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc50813e8 cs:33 sp:7fdbe9f8bf90 ax:7fdbe9f8c020 si:ffffffffff600000 di:557bc513b019 [11037015.852814] exe[156184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5398a13e8 cs:33 sp:7f7d41049f90 ax:7f7d4104a020 si:ffffffffff600000 di:55a53995b019 [11037028.604851] exe[153844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e42add83e8 cs:33 sp:7eefb64b3f90 ax:7eefb64b4020 si:ffffffffff600000 di:55e42ae92019 [11037029.840881] exe[111455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584c77473e8 cs:33 sp:7ef02f790f90 ax:7ef02f791020 si:ffffffffff600000 di:5584c7801019 [11037095.878257] exe[127729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2516943e8 cs:33 sp:7ff838c6ef90 ax:7ff838c6f020 si:ffffffffff600000 di:55a25174e019 [11037098.594061] exe[147533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55559ea513e8 cs:33 sp:7fce2363cf90 ax:7fce2363d020 si:ffffffffff600000 di:55559eb0b019 [11037133.804433] exe[143421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb92fb3e8 cs:33 sp:7f278b123f90 ax:7f278b124020 si:ffffffffff600000 di:555bb93b5019 [11037155.042412] exe[159263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577c03763e8 cs:33 sp:7ff848855f90 ax:7ff848856020 si:ffffffffff600000 di:5577c0430019 [11037181.544062] exe[121468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56079bc663e8 cs:33 sp:7f2243348f90 ax:7f2243349020 si:ffffffffff600000 di:56079bd20019 [11037189.208389] exe[138464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55658494e3e8 cs:33 sp:7f05e7fd3f90 ax:7f05e7fd4020 si:ffffffffff600000 di:556584a08019 [11037295.806338] exe[133324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c992aa3e8 cs:33 sp:7ece4b5fef90 ax:7ece4b5ff020 si:ffffffffff600000 di:560c99364019 [11037315.150963] exe[68054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563220e843e8 cs:33 sp:7fed1ab45f90 ax:7fed1ab46020 si:ffffffffff600000 di:563220f3e019 [11037954.700454] exe[144178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb934a686 cs:33 sp:7f278b123f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [11037954.829623] exe[160821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb934a686 cs:33 sp:7f278b123f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [11037955.546426] exe[169529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bb934a686 cs:33 sp:7f278b123f88 ax:ffffffffff600000 si:20000300 di:ffffffffff600000 [11039057.353502] exe[178353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25041f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.427943] exe[207658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25041f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.500406] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.521729] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.542668] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.564851] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.597151] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.618830] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.640758] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11039057.663197] exe[199549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615e9c2a686 cs:33 sp:7f8b25020f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11040859.703814] warn_bad_vsyscall: 25 callbacks suppressed [11040859.703817] exe[302987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4e8e8 ax:ffffffffff600000 si:7ffb16a4ee08 di:ffffffffff600000 [11040859.760337] exe[301308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4e8e8 ax:ffffffffff600000 si:7ffb16a4ee08 di:ffffffffff600000 [11040859.808847] exe[301371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4e8e8 ax:ffffffffff600000 si:7ffb16a4ee08 di:ffffffffff600000 [11040859.857359] exe[302866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4e8e8 ax:ffffffffff600000 si:7ffb16a4ee08 di:ffffffffff600000 [11041532.945554] exe[321445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f1dda2686 cs:33 sp:7f1ade7ad8e8 ax:ffffffffff600000 si:7f1ade7ade08 di:ffffffffff600000 [11041533.055597] exe[338493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f1dda2686 cs:33 sp:7f1ade7ad8e8 ax:ffffffffff600000 si:7f1ade7ade08 di:ffffffffff600000 [11041533.841238] exe[321423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f1dda2686 cs:33 sp:7f1ade7ad8e8 ax:ffffffffff600000 si:7f1ade7ade08 di:ffffffffff600000 [11041533.940744] exe[325504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f1dda2686 cs:33 sp:7f1ade7ad8e8 ax:ffffffffff600000 si:7f1ade7ade08 di:ffffffffff600000 [11042256.634777] exe[339342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d52d2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:9cc8000 [11042256.773784] exe[330183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d52d2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:9cc8000 [11042256.882989] exe[334163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d52d2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:9cc8000 [11042627.392275] exe[369899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae181e391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4245000 [11042627.486021] exe[344684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae181e391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4245000 [11042627.582741] exe[344141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae181e391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:4245000 [11043008.848044] exe[340340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae180d686 cs:33 sp:7fe4c30ff8e8 ax:ffffffffff600000 si:7fe4c30ffe08 di:ffffffffff600000 [11043008.933882] exe[344476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae180d686 cs:33 sp:7fe4c30ff8e8 ax:ffffffffff600000 si:7fe4c30ffe08 di:ffffffffff600000 [11043009.044360] exe[344476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae180d686 cs:33 sp:7fe4c30ff8e8 ax:ffffffffff600000 si:7fe4c30ffe08 di:ffffffffff600000 [11043009.081007] exe[340340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ae180d686 cs:33 sp:7fe4c30ff8e8 ax:ffffffffff600000 si:7fe4c30ffe08 di:ffffffffff600000 [11043152.652373] exe[386158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11043152.739217] exe[368853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11043152.820865] exe[378671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11043152.890913] exe[378747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558045520686 cs:33 sp:7ffb16a4ef88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11043179.235478] exe[387858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b963b16686 cs:33 sp:7fd672ae0f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11043179.292397] exe[305355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b963b16686 cs:33 sp:7fd672ae0f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11043179.353233] exe[377605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b963b16686 cs:33 sp:7fd672ae0f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11043179.405281] exe[377608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b963b16686 cs:33 sp:7fd672ae0f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11043411.758493] exe[395079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc729bc686 cs:33 sp:7ffa9cc418e8 ax:ffffffffff600000 si:7ffa9cc41e08 di:ffffffffff600000 [11043411.865409] exe[371508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc729bc686 cs:33 sp:7ffa9cc418e8 ax:ffffffffff600000 si:7ffa9cc41e08 di:ffffffffff600000 [11043412.783067] exe[394904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2d9d9c686 cs:33 sp:7f6103fa58e8 ax:ffffffffff600000 si:7f6103fa5e08 di:ffffffffff600000 [11043412.801183] exe[393906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc729bc686 cs:33 sp:7ffa9cc418e8 ax:ffffffffff600000 si:7ffa9cc41e08 di:ffffffffff600000 [11043412.871396] exe[395503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645150e1686 cs:33 sp:7f6a442f18e8 ax:ffffffffff600000 si:7f6a442f1e08 di:ffffffffff600000 [11043412.883965] exe[393900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2d9d9c686 cs:33 sp:7f6103fa58e8 ax:ffffffffff600000 si:7f6103fa5e08 di:ffffffffff600000 [11043412.918664] exe[369954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc729bc686 cs:33 sp:7ffa9cc418e8 ax:ffffffffff600000 si:7ffa9cc41e08 di:ffffffffff600000 [11043413.039372] exe[394048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645150e1686 cs:33 sp:7f6a442f18e8 ax:ffffffffff600000 si:7f6a442f1e08 di:ffffffffff600000 [11043413.795779] exe[393909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2d9d9c686 cs:33 sp:7f6103fa58e8 ax:ffffffffff600000 si:7f6103fa5e08 di:ffffffffff600000 [11043413.825318] exe[395131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645150e1686 cs:33 sp:7f6a442f18e8 ax:ffffffffff600000 si:7f6a442f1e08 di:ffffffffff600000 [11045090.564539] exe[439479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a817f6c686 cs:33 sp:7fba787218e8 ax:ffffffffff600000 si:7fba78721e08 di:ffffffffff600000 [11045090.728481] exe[424687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a817f6c686 cs:33 sp:7fba787218e8 ax:ffffffffff600000 si:7fba78721e08 di:ffffffffff600000 [11045090.763065] exe[439479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a817f6c686 cs:33 sp:7fba787008e8 ax:ffffffffff600000 si:7fba78700e08 di:ffffffffff600000 [11045090.897302] exe[430923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a817f6c686 cs:33 sp:7fba787218e8 ax:ffffffffff600000 si:7fba78721e08 di:ffffffffff600000 [11045431.807787] exe[411209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f64310686 cs:33 sp:7f93847fef88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [11045711.941510] exe[435081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56336d536686 cs:33 sp:7fdaa402b8e8 ax:ffffffffff600000 si:7fdaa402be08 di:ffffffffff600000 [11045715.020271] exe[461505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564542419686 cs:33 sp:7f4a4363b8e8 ax:ffffffffff600000 si:7f4a4363be08 di:ffffffffff600000 [11045715.242135] exe[466364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564542419686 cs:33 sp:7f4a4363b8e8 ax:ffffffffff600000 si:7f4a4363be08 di:ffffffffff600000 [11045715.986661] exe[462902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564542419686 cs:33 sp:7f4a4363b8e8 ax:ffffffffff600000 si:7f4a4363be08 di:ffffffffff600000 [11045716.133094] exe[461713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564542419686 cs:33 sp:7f4a4363b8e8 ax:ffffffffff600000 si:7f4a4363be08 di:ffffffffff600000 [11046248.980530] exe[434402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1e6c92686 cs:33 sp:7f0196564f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [11046493.199037] exe[468154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f78e0db391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046566.596596] exe[466154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c71fe12391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046569.731978] exe[403055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555740ebf391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046570.557971] exe[469781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578f8047391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046575.244976] exe[450003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634c51a2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046579.633860] exe[475499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca213c6391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046590.800843] exe[463223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e2a8bb391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046596.320172] exe[478461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9ace84391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046612.096131] exe[355774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637448bd391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046675.945252] exe[468161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad771fe686 cs:33 sp:7edfa2b948e8 ax:ffffffffff600000 si:7edfa2b94e08 di:ffffffffff600000 [11046676.046756] exe[479335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad771fe686 cs:33 sp:7edfa2b948e8 ax:ffffffffff600000 si:7edfa2b94e08 di:ffffffffff600000 [11046676.914271] exe[446237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad771fe686 cs:33 sp:7edfa2b948e8 ax:ffffffffff600000 si:7edfa2b94e08 di:ffffffffff600000 [11046677.051090] exe[479330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad771fe686 cs:33 sp:7edfa2b948e8 ax:ffffffffff600000 si:7edfa2b94e08 di:ffffffffff600000 [11046781.513479] exe[431779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571773f0391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11046964.150903] exe[486494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb8dbcf391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11047011.941035] exe[430427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a18c1e391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11047035.276050] exe[485406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55641b0bf391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:40000 [11047173.177804] exe[488122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c71fe12391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047174.497956] exe[460017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634c51a2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047178.270175] exe[454828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a817f7d391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047180.159003] exe[460209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ea8c2f391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047186.379877] exe[408650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653e0720391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047187.619616] exe[483369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e43369391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047200.353467] exe[465132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bf80fd391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047201.234243] exe[474819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e2a8bb391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047220.077337] exe[377451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637448bd391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047388.452131] exe[467475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560217bb7391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047564.128432] exe[503402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4af4f3391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047616.448048] exe[502445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604f8a1c391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047869.400175] exe[519504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0c7312686 cs:33 sp:7f423298d8e8 ax:ffffffffff600000 si:7f423298de08 di:ffffffffff600000 [11047932.579991] exe[526945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0824b1391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047932.633066] exe[526783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0824b1391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11047932.669481] exe[513538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0824b1391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11048036.847181] exe[519494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56454f1a4686 cs:33 sp:7fea038d68e8 ax:ffffffffff600000 si:7fea038d6e08 di:ffffffffff600000 [11048192.883203] exe[507079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f066306686 cs:33 sp:7ea5511dd8e8 ax:ffffffffff600000 si:7ea5511dde08 di:ffffffffff600000 [11049256.914979] exe[547040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc8b352686 cs:33 sp:7f5c611978e8 ax:ffffffffff600000 si:7f5c61197e08 di:ffffffffff600000 [11049357.710840] exe[551820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df37e72391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11049601.802029] exe[553387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b8ab18391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11049848.632343] exe[558483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f11b85d686 cs:33 sp:7f727ce878e8 ax:ffffffffff600000 si:7f727ce87e08 di:ffffffffff600000 [11049848.728053] exe[559488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f11b85d686 cs:33 sp:7f727ce878e8 ax:ffffffffff600000 si:7f727ce87e08 di:ffffffffff600000 [11049849.446253] exe[559329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f11b85d686 cs:33 sp:7f727ce878e8 ax:ffffffffff600000 si:7f727ce87e08 di:ffffffffff600000 [11049849.490318] exe[551401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f11b85d686 cs:33 sp:7f727ce458e8 ax:ffffffffff600000 si:7f727ce45e08 di:ffffffffff600000 [11050618.384769] exe[503563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4af4f3391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11050618.476637] exe[503418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4af4f3391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11050618.575267] exe[508753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4af4f3391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11051240.343617] exe[618303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604fb0b2391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11051264.663042] exe[619618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560dd109c391 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [11052386.960838] exe[645058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556615a0c3e8 cs:33 sp:7fe475f59f90 ax:7fe475f5a020 si:ffffffffff600000 di:556615ac6019 [11052387.060719] exe[648391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556615a0c3e8 cs:33 sp:7fe475f17f90 ax:7fe475f18020 si:ffffffffff600000 di:556615ac6019 [11052387.233005] exe[654630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556615a0c3e8 cs:33 sp:7fe475f59f90 ax:7fe475f5a020 si:ffffffffff600000 di:556615ac6019 [11053139.128010] exe[653272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad0ca2f686 cs:33 sp:7f52a54478e8 ax:ffffffffff600000 si:7f52a5447e08 di:ffffffffff600000 [11053139.249283] exe[653078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad0ca2f686 cs:33 sp:7f52a54268e8 ax:ffffffffff600000 si:7f52a5426e08 di:ffffffffff600000 [11053139.365051] exe[654296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad0ca2f686 cs:33 sp:7f52a54268e8 ax:ffffffffff600000 si:7f52a5426e08 di:ffffffffff600000 [11054173.483306] exe[693145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b29fc686 cs:33 sp:7f55478368e8 ax:ffffffffff600000 si:7f5547836e08 di:ffffffffff600000 [11054173.536237] exe[694542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b29fc686 cs:33 sp:7f55478368e8 ax:ffffffffff600000 si:7f5547836e08 di:ffffffffff600000 [11054173.536382] exe[694529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b29fc686 cs:33 sp:7f55473fe8e8 ax:ffffffffff600000 si:7f55473fee08 di:ffffffffff600000 [11054173.609242] exe[693632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573b29fc686 cs:33 sp:7f554739b8e8 ax:ffffffffff600000 si:7f554739be08 di:ffffffffff600000 [11054564.773207] exe[691048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607499c5020 cs:33 sp:7f061b822110 ax:5607499c5020 si:4 di:560749a85ab0 [11054564.879877] exe[693432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607499c5020 cs:33 sp:7f061b822110 ax:5607499c5020 si:4 di:560749a85ab0 [11054565.160649] exe[691380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607499c5020 cs:33 sp:7f061b822110 ax:5607499c5020 si:4 di:560749a85ab0 [11054936.591997] exe[734364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba5c94b3e8 cs:33 sp:7ed14b571f90 ax:7ed14b572020 si:ffffffffff600000 di:55ba5ca05019 [11054936.719013] exe[735932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba5c94b3e8 cs:33 sp:7ed14b571f90 ax:7ed14b572020 si:ffffffffff600000 di:55ba5ca05019 [11054936.863115] exe[731386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba5c94b3e8 cs:33 sp:7ed14b571f90 ax:7ed14b572020 si:ffffffffff600000 di:55ba5ca05019