00 00 00 00 00 00 00 D0307 22:52:08.005602 340720 task_log.go:128] [ 33602: 33604] 55e7d9159350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.005649 340720 task_log.go:128] [ 33602: 33604] 55e7d9159360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.005968 340720 task_log.go:128] [ 33602: 33604] 55e7d9159370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.006178 340720 task_log.go:149] [ 33602: 33604] Code: D0307 22:52:08.006330 340720 task_log.go:167] [ 33602: 33604] 55e7d9158f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.006498 340720 task_log.go:167] [ 33602: 33604] 55e7d9158f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.006672 340720 task_log.go:167] [ 33602: 33604] 55e7d9158f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.006734 340720 task_log.go:167] [ 33602: 33604] 55e7d9158f70: 80 8f 15 d9 e7 55 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.006806 340720 task_log.go:167] [ 33602: 33604] 55e7d9158f80: 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.006856 340720 task_log.go:167] [ 33602: 33604] 55e7d9158f90: 18 00 c0 23 a1 7e 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.006904 340720 task_log.go:167] [ 33602: 33604] 55e7d9158fa0: 01 00 00 00 00 00 00 00 87 0b 00 00 00 00 00 00 D0307 22:52:08.007118 340720 task_log.go:167] [ 33602: 33604] 55e7d9158fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.007257 340720 task_log.go:71] [ 33602: 33604] Mappings: VMAs: 00068000-0006d000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2c320000-1b2c920000 rw-s 00000000 00:04 11 /memfd:syz-shared-mem (deleted) 55e7d8fad000-55e7d8fd1000 r--p 00000000 00:08 8 /syz-executor 55e7d8fd1000-55e7d9083000 r-xp 00024000 00:08 8 /syz-executor 55e7d9083000-55e7d90d5000 r--p 000d6000 00:08 8 /syz-executor 55e7d90d6000-55e7d912f000 r--p 00128000 00:08 8 /syz-executor 55e7d912f000-55e7d9138000 rw-p 00181000 00:08 8 /syz-executor 55e7d913d000-55e7d9c89000 rw-p 00000000 00:00 0 55e7d9c89000-55e7d9cab000 rw-p 00000000 00:00 0 [heap] 7ea123c00000-7ea124000000 r--p 00000000 00:04 10 /memfd:syz-shared-mem (deleted) 7ea124167000-7ea124168000 ---p 00000000 00:00 0 7ea124168000-7ea124188000 rw-p 00000000 00:00 0 7ea124188000-7ea124189000 r--p 00000000 00:00 0 [vvar] 7ea124189000-7ea12418b000 r-xp 00000000 00:00 0 7ed7ba5cf000-7ed7badcf000 rw-p 00000000 00:00 0 [stack] PMAs: 00068000-00069000 r-xp 06d02000 *pgalloc.MemoryFile 00069000-0006d000 r-xp 03d81000 *pgalloc.MemoryFile 1b2c320000-1b2c920000 rw-s 0e200000 *pgalloc.MemoryFile 55e7d8fad000-55e7d8fd1000 r--p 0672b000 *pgalloc.MemoryFile 55e7d8fd1000-55e7d8fea000 r-xs 00024000 *gofer.dentryPlatformFile 55e7d8fea000-55e7d8feb000 r-xp 04625000 *pgalloc.MemoryFile 55e7d8feb000-55e7d8fec000 r-xp 03ddf000 *pgalloc.MemoryFile 55e7d8fec000-55e7d8fed000 r-xp 03d79000 *pgalloc.MemoryFile 55e7d8fed000-55e7d8ff2000 r-xs 00040000 *gofer.dentryPlatformFile 55e7d8ff2000-55e7d8ff3000 r-xp 04650000 *pgalloc.MemoryFile 55e7d8ff3000-55e7d9036000 r-xs 00046000 *gofer.dentryPlatformFile 55e7d9036000-55e7d9037000 r-xp 04634000 *pgalloc.MemoryFile 55e7d9037000-55e7d9038000 r-xp 04624000 *pgalloc.MemoryFile 55e7d9038000-55e7d9039000 r-xp 06e77000 *pgalloc.MemoryFile 55e7d9039000-55e7d903a000 r-xp 03d85000 *pgalloc.MemoryFile 55e7d903a000-55e7d903b000 r-xp 072ef000 *pgalloc.MemoryFile 55e7d903b000-55e7d905d000 r-xs 0008e000 *gofer.dentryPlatformFile 55e7d905d000-55e7d905e000 r-xp 04635000 *pgalloc.MemoryFile 55e7d905e000-55e7d905f000 r-xp 06d45000 *pgalloc.MemoryFile 55e7d9076000-55e7d9077000 r-xp 04626000 *pgalloc.MemoryFile 55e7d9082000-55e7d9083000 r-xp 01d38000 *pgalloc.MemoryFile 55e7d9083000-55e7d90d5000 r--p 06fb7000 *pgalloc.MemoryFile 55e7d90d6000-55e7d9138000 rw-p 102e1000 *pgalloc.MemoryFile 55e7d913d000-55e7d9200000 rw-p 12933000 *pgalloc.MemoryFile 55e7d9c00000-55e7d9c89000 rw-p 0fff2000 *pgalloc.MemoryFile 55e7d9c89000-55e7d9c8a000 rw-p 06af6000 *pgalloc.MemoryFile 55e7d9c8a000-55e7d9cab000 rw-p 0fb88000 *pgalloc.MemoryFile 7ea123c00000-7ea124000000 r--s 0de00000 *pgalloc.MemoryFile 7ea124168000-7ea124188000 rw-p 08dbf000 *pgalloc.MemoryFile 7ea124188000-7ea124189000 r--s 00002000 *pgalloc.MemoryFile 7ea124189000-7ea12418b000 r-xs 00000000 *pgalloc.MemoryFile 7ed7bac00000-7ed7badcb000 r--p 07a00000 *pgalloc.MemoryFile 7ed7badcb000-7ed7badcd000 r--p 07210000 *pgalloc.MemoryFile 7ed7badcd000-7ed7badcf000 rw-p 072a0000 *pgalloc.MemoryFile D0307 22:52:08.009613 340720 task_log.go:73] [ 33602: 33604] FDTable: fd:0 => name pipe:[3454] fd:1 => name pipe:[3454] fd:2 => name pipe:[3454] fd:200 => name /dev/net/tun fd:201 => name / D0307 22:52:08.009998 340720 task_signals.go:470] [ 33602: 33604] Notified of signal 11 D0307 22:52:08.010369 340720 task_signals.go:220] [ 33602: 33604] Signal 11: delivering to handler D0307 22:52:08.013654 340720 usertrap_amd64.go:212] [ 33603: 33603] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.013783 340720 usertrap_amd64.go:122] [ 33603: 33603] Allocate a new trap: 0xc004637980 42 D0307 22:52:08.013888 340720 usertrap_amd64.go:225] [ 33603: 33603] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.026465 340720 usertrap_amd64.go:212] [ 33603: 33603] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.026578 340720 usertrap_amd64.go:122] [ 33603: 33603] Allocate a new trap: 0xc004637980 43 D0307 22:52:08.026662 340720 usertrap_amd64.go:225] [ 33603: 33603] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.026904 340720 task_signals.go:470] [ 33602: 33604] Notified of signal 7 D0307 22:52:08.027031 340720 task_signals.go:220] [ 33602: 33604] Signal 7: delivering to handler D0307 22:52:08.026999 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.027686 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.027756 340720 usertrap_amd64.go:212] [ 33602: 33602] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.027820 340720 usertrap_amd64.go:122] [ 33602: 33602] Allocate a new trap: 0xc002538240 43 D0307 22:52:08.027909 340720 usertrap_amd64.go:225] [ 33602: 33602] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.036423 340720 usertrap_amd64.go:212] [ 33606: 33606] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:08.036515 340720 usertrap_amd64.go:122] [ 33606: 33606] Allocate a new trap: 0xc0018909c0 40 D0307 22:52:08.037059 340720 usertrap_amd64.go:225] [ 33606: 33606] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:08.039282 340720 task_exit.go:204] [ 33602: 33602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.039491 340720 task_signals.go:204] [ 33602: 33604] Signal 33602, PID: 33604, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.039586 340720 task_exit.go:204] [ 33602: 33602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.039866 340720 task_exit.go:204] [ 33602: 33604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.043934 340720 task_exit.go:204] [ 33602: 33604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.044117 340720 task_exit.go:204] [ 33602: 33604] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.048083 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.049246 340720 task_exit.go:204] [ 33603: 33603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.049560 340720 task_exit.go:204] [ 33603: 33603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.049987 340720 task_signals.go:204] [ 33603: 33607] Signal 33603, PID: 33607, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.050146 340720 task_exit.go:204] [ 33603: 33607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.051166 340720 task_exit.go:204] [ 33602: 33602] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.053882 340720 task_exit.go:204] [ 33603: 33607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.053974 340720 task_exit.go:204] [ 33603: 33607] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.054065 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:08.054745 340720 usertrap_amd64.go:212] [ 33606: 33606] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:08.054848 340720 usertrap_amd64.go:122] [ 33606: 33606] Allocate a new trap: 0xc0018909c0 41 D0307 22:52:08.054949 340720 usertrap_amd64.go:225] [ 33606: 33606] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:08.055394 340720 task_exit.go:204] [ 33603: 33603] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 3: rt_sigreturn() syz_open_dev$tty1(0xc, 0x4, 0x1) D0307 22:52:08.062020 340720 usertrap_amd64.go:212] [ 33600: 33600] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:08.062121 340720 usertrap_amd64.go:122] [ 33600: 33600] Allocate a new trap: 0xc004637950 42 D0307 22:52:08.062220 340720 usertrap_amd64.go:225] [ 33600: 33600] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:08.063058 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.063712 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.067697 340720 task_signals.go:204] [ 33600: 33605] Signal 33600, PID: 33605, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.067821 340720 task_exit.go:204] [ 33600: 33605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.067907 340720 task_exit.go:204] [ 33600: 33600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.068521 340720 task_exit.go:204] [ 33600: 33605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.068593 340720 task_exit.go:204] [ 33600: 33605] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) D0307 22:52:08.073433 340720 task_exit.go:204] [ 33600: 33600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.073541 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:08.073948 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.074292 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.074482 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.074916 340720 task_exit.go:204] [ 33600: 33600] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.075403 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:08 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) D0307 22:52:08.090957 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.091485 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.092692 340720 usertrap_amd64.go:212] [ 33606: 33606] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:08.093215 340720 usertrap_amd64.go:122] [ 33606: 33606] Allocate a new trap: 0xc0018909c0 42 D0307 22:52:08.093392 340720 usertrap_amd64.go:225] [ 33606: 33606] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:08.160477 340720 usertrap_amd64.go:212] [ 33608: 33608] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:08.160614 340720 usertrap_amd64.go:122] [ 33608: 33608] Allocate a new trap: 0xc00636d8c0 40 D0307 22:52:08.161179 340720 usertrap_amd64.go:225] [ 33608: 33608] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:08.171655 340720 usertrap_amd64.go:212] [ 33610: 33610] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:08.171790 340720 usertrap_amd64.go:122] [ 33610: 33610] Allocate a new trap: 0xc00275d500 40 D0307 22:52:08.171863 340720 usertrap_amd64.go:212] [ 33608: 33608] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:08.171976 340720 usertrap_amd64.go:122] [ 33608: 33608] Allocate a new trap: 0xc00636d8c0 41 D0307 22:52:08.172062 340720 usertrap_amd64.go:225] [ 33608: 33608] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:08.172494 340720 usertrap_amd64.go:225] [ 33610: 33610] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:08.176194 340720 usertrap_amd64.go:212] [ 33610: 33610] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:08.176288 340720 usertrap_amd64.go:122] [ 33610: 33610] Allocate a new trap: 0xc00275d500 41 D0307 22:52:08.176375 340720 usertrap_amd64.go:225] [ 33610: 33610] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:08.177228 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.177728 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.177736 340720 usertrap_amd64.go:212] [ 33611: 33611] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:08.177854 340720 usertrap_amd64.go:122] [ 33611: 33611] Allocate a new trap: 0xc00636d920 39 D0307 22:52:08.178361 340720 usertrap_amd64.go:225] [ 33611: 33611] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:08.182538 340720 usertrap_amd64.go:212] [ 33611: 33611] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:08.182632 340720 usertrap_amd64.go:122] [ 33611: 33611] Allocate a new trap: 0xc00636d920 40 D0307 22:52:08.182727 340720 usertrap_amd64.go:225] [ 33611: 33611] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:08.189146 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.189426 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.195130 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.195578 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.195881 340720 usertrap_amd64.go:212] [ 33606: 33606] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:08.195941 340720 usertrap_amd64.go:122] [ 33606: 33606] Allocate a new trap: 0xc0018909c0 43 D0307 22:52:08.196001 340720 usertrap_amd64.go:225] [ 33606: 33606] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:08.198456 340720 task_exit.go:204] [ 33606: 33606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.199546 340720 task_exit.go:204] [ 33606: 33606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.206888 340720 usertrap_amd64.go:212] [ 33608: 33608] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:08.206999 340720 usertrap_amd64.go:122] [ 33608: 33608] Allocate a new trap: 0xc00636d8c0 42 D0307 22:52:08.207073 340720 usertrap_amd64.go:225] [ 33608: 33608] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:08.208229 340720 usertrap_amd64.go:212] [ 33610: 33610] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.208359 340720 usertrap_amd64.go:122] [ 33610: 33610] Allocate a new trap: 0xc00275d500 42 D0307 22:52:08.208466 340720 usertrap_amd64.go:225] [ 33610: 33610] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.209242 340720 task_signals.go:204] [ 33606: 33609] Signal 33606, PID: 33609, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.209425 340720 task_exit.go:204] [ 33606: 33609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.215636 340720 task_exit.go:204] [ 33606: 33609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.215700 340720 task_exit.go:204] [ 33606: 33609] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.215819 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:08.216801 340720 task_exit.go:204] [ 33606: 33606] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) D0307 22:52:08.221881 340720 usertrap_amd64.go:212] [ 33611: 33611] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:08.221993 340720 usertrap_amd64.go:122] [ 33611: 33611] Allocate a new trap: 0xc00636d920 41 D0307 22:52:08.222052 340720 usertrap_amd64.go:225] [ 33611: 33611] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:08.237022 340720 task_run.go:308] [ 33608: 33612] Unhandled user fault: addr=55e7d9158f8c ip=55e7d9158f8c access=r-x sig=11 err=operation not permitted D0307 22:52:08.237127 340720 task_log.go:87] [ 33608: 33612] Registers: D0307 22:52:08.237194 340720 task_log.go:94] [ 33608: 33612] Cs = 0000000000000033 D0307 22:52:08.237237 340720 task_log.go:94] [ 33608: 33612] Ds = 0000000000000000 D0307 22:52:08.237262 340720 task_log.go:94] [ 33608: 33612] Eflags = 0000000000050ac6 D0307 22:52:08.237285 340720 task_log.go:94] [ 33608: 33612] Es = 0000000000000000 D0307 22:52:08.237313 340720 task_log.go:94] [ 33608: 33612] Fs = 0000000000000000 D0307 22:52:08.237336 340720 task_log.go:94] [ 33608: 33612] Fs_base = 00007ea124187700 D0307 22:52:08.237379 340720 task_log.go:94] [ 33608: 33612] Gs = 0000000000000000 D0307 22:52:08.237415 340720 task_log.go:94] [ 33608: 33612] Gs_base = 00007fe3cc9df000 D0307 22:52:08.237450 340720 task_log.go:94] [ 33608: 33612] Orig_rax = ffffffffffffffff D0307 22:52:08.237496 340720 task_log.go:94] [ 33608: 33612] R10 = 0000000000000000 D0307 22:52:08.237548 340720 task_log.go:94] [ 33608: 33612] R11 = ffffffff00000b87 D0307 22:52:08.237576 340720 task_log.go:94] [ 33608: 33612] R12 = 0000000000000000 D0307 22:52:08.237624 340720 task_log.go:94] [ 33608: 33612] R13 = 000055e7d9110190 D0307 22:52:08.237659 340720 task_log.go:94] [ 33608: 33612] R14 = 00000000000009fd D0307 22:52:08.237709 340720 task_log.go:94] [ 33608: 33612] R15 = 0000000003b3688a D0307 22:52:08.237739 340720 task_log.go:94] [ 33608: 33612] R8 = 0000000000000000 D0307 22:52:08.237811 340720 task_log.go:94] [ 33608: 33612] R9 = 000055e7d9158f80 D0307 22:52:08.237861 340720 task_log.go:94] [ 33608: 33612] Rax = 0000000000000000 D0307 22:52:08.237892 340720 task_log.go:94] [ 33608: 33612] Rbp = 0000000000000000 D0307 22:52:08.237931 340720 task_log.go:94] [ 33608: 33612] Rbx = 0000000000000000 D0307 22:52:08.237964 340720 task_log.go:94] [ 33608: 33612] Rcx = 000055e7d9158f88 D0307 22:52:08.238013 340720 task_log.go:94] [ 33608: 33612] Rdi = 0000000000000000 D0307 22:52:08.238042 340720 task_log.go:94] [ 33608: 33612] Rdx = 0000000000000000 D0307 22:52:08.238075 340720 task_log.go:94] [ 33608: 33612] Rip = 000055e7d9158f8c D0307 22:52:08.238125 340720 task_log.go:94] [ 33608: 33612] Rsi = 0000000000000000 D0307 22:52:08.238160 340720 task_log.go:94] [ 33608: 33612] Rsp = 000055e7d9158f80 D0307 22:52:08.238107 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.238183 340720 task_log.go:94] [ 33608: 33612] Ss = 000000000000002b D0307 22:52:08.238218 340720 task_log.go:111] [ 33608: 33612] Stack: D0307 22:52:08.238268 340720 task_log.go:128] [ 33608: 33612] 55e7d9158f80: 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.238311 340720 task_log.go:128] [ 33608: 33612] 55e7d9158f90: 18 00 c0 23 a1 7e 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.238362 340720 task_log.go:128] [ 33608: 33612] 55e7d9158fa0: 01 00 00 00 00 00 00 00 87 0b 00 00 00 00 00 00 D0307 22:52:08.238453 340720 task_log.go:128] [ 33608: 33612] 55e7d9158fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.238552 340720 task_log.go:128] [ 33608: 33612] 55e7d9158fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.238602 340720 task_log.go:128] [ 33608: 33612] 55e7d9158fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.238642 340720 task_log.go:128] [ 33608: 33612] 55e7d9158fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.238682 340720 task_log.go:128] [ 33608: 33612] 55e7d9158ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.238484 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.239018 340720 task_log.go:128] [ 33608: 33612] 55e7d9159000: 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.239104 340720 task_log.go:128] [ 33608: 33612] 55e7d9159010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.239141 340720 task_log.go:128] [ 33608: 33612] 55e7d9159020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.239174 340720 task_log.go:128] [ 33608: 33612] 55e7d9159030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.239206 340720 task_log.go:128] [ 33608: 33612] 55e7d9159040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.239871 340720 task_log.go:128] [ 33608: 33612] 55e7d9159050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.239910 340720 task_log.go:128] [ 33608: 33612] 55e7d9159060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.239985 340720 task_log.go:128] [ 33608: 33612] 55e7d9159070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240049 340720 task_log.go:128] [ 33608: 33612] 55e7d9159080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240144 340720 task_log.go:128] [ 33608: 33612] 55e7d9159090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240242 340720 task_log.go:128] [ 33608: 33612] 55e7d91590a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240455 340720 task_log.go:128] [ 33608: 33612] 55e7d91590b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240536 340720 task_log.go:128] [ 33608: 33612] 55e7d91590c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240599 340720 task_log.go:128] [ 33608: 33612] 55e7d91590d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240674 340720 task_log.go:128] [ 33608: 33612] 55e7d91590e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240736 340720 task_log.go:128] [ 33608: 33612] 55e7d91590f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240779 340720 task_log.go:128] [ 33608: 33612] 55e7d9159100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240822 340720 task_log.go:128] [ 33608: 33612] 55e7d9159110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240863 340720 task_log.go:128] [ 33608: 33612] 55e7d9159120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240902 340720 task_log.go:128] [ 33608: 33612] 55e7d9159130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.240974 340720 task_log.go:128] [ 33608: 33612] 55e7d9159140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241024 340720 task_log.go:128] [ 33608: 33612] 55e7d9159150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241073 340720 task_log.go:128] [ 33608: 33612] 55e7d9159160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241113 340720 task_log.go:128] [ 33608: 33612] 55e7d9159170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241150 340720 task_log.go:128] [ 33608: 33612] 55e7d9159180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241192 340720 task_log.go:128] [ 33608: 33612] 55e7d9159190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241222 340720 task_log.go:128] [ 33608: 33612] 55e7d91591a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241264 340720 task_log.go:128] [ 33608: 33612] 55e7d91591b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241331 340720 task_log.go:128] [ 33608: 33612] 55e7d91591c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241429 340720 task_log.go:128] [ 33608: 33612] 55e7d91591d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241502 340720 task_log.go:128] [ 33608: 33612] 55e7d91591e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241561 340720 task_log.go:128] [ 33608: 33612] 55e7d91591f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241614 340720 task_log.go:128] [ 33608: 33612] 55e7d9159200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241659 340720 task_log.go:128] [ 33608: 33612] 55e7d9159210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241724 340720 task_log.go:128] [ 33608: 33612] 55e7d9159220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241767 340720 task_log.go:128] [ 33608: 33612] 55e7d9159230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241831 340720 task_log.go:128] [ 33608: 33612] 55e7d9159240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241889 340720 task_log.go:128] [ 33608: 33612] 55e7d9159250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.241958 340720 task_log.go:128] [ 33608: 33612] 55e7d9159260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242001 340720 task_log.go:128] [ 33608: 33612] 55e7d9159270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242055 340720 task_log.go:128] [ 33608: 33612] 55e7d9159280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242136 340720 task_log.go:128] [ 33608: 33612] 55e7d9159290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242198 340720 task_log.go:128] [ 33608: 33612] 55e7d91592a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242268 340720 task_log.go:128] [ 33608: 33612] 55e7d91592b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242428 340720 task_log.go:128] [ 33608: 33612] 55e7d91592c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242570 340720 task_log.go:128] [ 33608: 33612] 55e7d91592d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242726 340720 task_log.go:128] [ 33608: 33612] 55e7d91592e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242795 340720 task_log.go:128] [ 33608: 33612] 55e7d91592f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242839 340720 task_log.go:128] [ 33608: 33612] 55e7d9159300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.242966 340720 task_log.go:128] [ 33608: 33612] 55e7d9159310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243037 340720 task_log.go:128] [ 33608: 33612] 55e7d9159320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243107 340720 task_log.go:128] [ 33608: 33612] 55e7d9159330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243157 340720 task_log.go:128] [ 33608: 33612] 55e7d9159340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243233 340720 task_log.go:128] [ 33608: 33612] 55e7d9159350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243280 340720 task_log.go:128] [ 33608: 33612] 55e7d9159360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243349 340720 task_log.go:128] [ 33608: 33612] 55e7d9159370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243401 340720 task_log.go:149] [ 33608: 33612] Code: D0307 22:52:08.243481 340720 task_log.go:167] [ 33608: 33612] 55e7d9158f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243532 340720 task_log.go:167] [ 33608: 33612] 55e7d9158f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243567 340720 task_log.go:167] [ 33608: 33612] 55e7d9158f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243613 340720 task_log.go:167] [ 33608: 33612] 55e7d9158f70: 80 8f 15 d9 e7 55 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243661 340720 task_log.go:167] [ 33608: 33612] 55e7d9158f80: 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243694 340720 task_log.go:167] [ 33608: 33612] 55e7d9158f90: 18 00 c0 23 a1 7e 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.243746 340720 task_log.go:167] [ 33608: 33612] 55e7d9158fa0: 01 00 00 00 00 00 00 00 87 0b 00 00 00 00 00 00 D0307 22:52:08.243803 340720 task_log.go:167] [ 33608: 33612] 55e7d9158fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.243843 340720 task_log.go:71] [ 33608: 33612] Mappings: VMAs: 00068000-0006d000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2c320000-1b2c920000 rw-s 00000000 00:04 11 /memfd:syz-shared-mem (deleted) 55e7d8fad000-55e7d8fd1000 r--p 00000000 00:08 8 /syz-executor 55e7d8fd1000-55e7d9083000 r-xp 00024000 00:08 8 /syz-executor 55e7d9083000-55e7d90d5000 r--p 000d6000 00:08 8 /syz-executor 55e7d90d6000-55e7d912f000 r--p 00128000 00:08 8 /syz-executor 55e7d912f000-55e7d9138000 rw-p 00181000 00:08 8 /syz-executor 55e7d913d000-55e7d9c89000 rw-p 00000000 00:00 0 55e7d9c89000-55e7d9cab000 rw-p 00000000 00:00 0 [heap] 7ea123c00000-7ea124000000 r--p 00000000 00:04 10 /memfd:syz-shared-mem (deleted) 7ea124167000-7ea124168000 ---p 00000000 00:00 0 7ea124168000-7ea124188000 rw-p 00000000 00:00 0 7ea124188000-7ea124189000 r--p 00000000 00:00 0 [vvar] 7ea124189000-7ea12418b000 r-xp 00000000 00:00 0 7ed7ba5cf000-7ed7badcf000 rw-p 00000000 00:00 0 [stack] PMAs: 00068000-00069000 r-xp 06bf1000 *pgalloc.MemoryFile 00069000-0006d000 r-xp 03d81000 *pgalloc.MemoryFile 1b2c320000-1b2c920000 rw-s 0e200000 *pgalloc.MemoryFile 55e7d8fad000-55e7d8fd1000 r--p 0672b000 *pgalloc.MemoryFile 55e7d8fd1000-55e7d8fea000 r-xs 00024000 *gofer.dentryPlatformFile 55e7d8fea000-55e7d8feb000 r-xp 04625000 *pgalloc.MemoryFile 55e7d8feb000-55e7d8fec000 r-xp 03ddf000 *pgalloc.MemoryFile 55e7d8fec000-55e7d8fed000 r-xp 03d79000 *pgalloc.MemoryFile 55e7d8fed000-55e7d8ff2000 r-xs 00040000 *gofer.dentryPlatformFile 55e7d8ff2000-55e7d8ff3000 r-xp 04650000 *pgalloc.MemoryFile 55e7d8ff3000-55e7d9036000 r-xs 00046000 *gofer.dentryPlatformFile 55e7d9036000-55e7d9037000 r-xp 04634000 *pgalloc.MemoryFile 55e7d9037000-55e7d9038000 r-xp 04624000 *pgalloc.MemoryFile 55e7d9038000-55e7d9039000 r-xp 06e77000 *pgalloc.MemoryFile 55e7d9039000-55e7d903a000 r-xp 03d85000 *pgalloc.MemoryFile 55e7d903a000-55e7d903b000 r-xp 07346000 *pgalloc.MemoryFile 55e7d903b000-55e7d905d000 r-xs 0008e000 *gofer.dentryPlatformFile 55e7d905d000-55e7d905e000 r-xp 04635000 *pgalloc.MemoryFile 55e7d905e000-55e7d905f000 r-xp 06d02000 *pgalloc.MemoryFile 55e7d9076000-55e7d9077000 r-xp 04626000 *pgalloc.MemoryFile 55e7d9082000-55e7d9083000 r-xp 01d38000 *pgalloc.MemoryFile 55e7d9083000-55e7d90d5000 r--p 06fb7000 *pgalloc.MemoryFile 55e7d90d6000-55e7d9138000 rw-p 0fc9a000 *pgalloc.MemoryFile 55e7d913d000-55e7d9200000 rw-p 138a6000 *pgalloc.MemoryFile 55e7d9c00000-55e7d9c89000 rw-p 0fff2000 *pgalloc.MemoryFile 55e7d9c89000-55e7d9c8a000 rw-p 0479f000 *pgalloc.MemoryFile 55e7d9c8a000-55e7d9cab000 rw-p 0fb88000 *pgalloc.MemoryFile 7ea123c00000-7ea124000000 r--s 0de00000 *pgalloc.MemoryFile 7ea124168000-7ea124188000 rw-p 08dbf000 *pgalloc.MemoryFile 7ea124188000-7ea124189000 r--s 00002000 *pgalloc.MemoryFile 7ea124189000-7ea12418b000 r-xs 00000000 *pgalloc.MemoryFile 7ed7bac00000-7ed7badcb000 r--p 07a00000 *pgalloc.MemoryFile 7ed7badcb000-7ed7badcd000 r--p 07210000 *pgalloc.MemoryFile 7ed7badcd000-7ed7badcf000 rw-p 06d71000 *pgalloc.MemoryFile D0307 22:52:08.246348 340720 task_log.go:73] [ 33608: 33612] FDTable: fd:201 => name / fd:0 => name pipe:[3454] fd:1 => name pipe:[3454] fd:2 => name pipe:[3454] fd:200 => name /dev/net/tun D0307 22:52:08.246939 340720 task_signals.go:470] [ 33608: 33612] Notified of signal 11 D0307 22:52:08.247099 340720 task_signals.go:220] [ 33608: 33612] Signal 11: delivering to handler D0307 22:52:08.249038 340720 task_signals.go:470] [ 33608: 33612] Notified of signal 7 D0307 22:52:08.249144 340720 task_signals.go:220] [ 33608: 33612] Signal 7: delivering to handler D0307 22:52:08.250089 340720 usertrap_amd64.go:212] [ 33608: 33608] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.250141 340720 usertrap_amd64.go:122] [ 33608: 33608] Allocate a new trap: 0xc00636d8c0 43 D0307 22:52:08.250208 340720 usertrap_amd64.go:225] [ 33608: 33608] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.253792 340720 usertrap_amd64.go:212] [ 33610: 33610] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.253898 340720 usertrap_amd64.go:122] [ 33610: 33610] Allocate a new trap: 0xc00275d500 43 D0307 22:52:08.254025 340720 usertrap_amd64.go:225] [ 33610: 33610] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.257988 340720 task_exit.go:204] [ 33610: 33610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.258188 340720 task_signals.go:204] [ 33610: 33613] Signal 33610, PID: 33613, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.258278 340720 task_exit.go:204] [ 33610: 33610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.258409 340720 task_exit.go:204] [ 33610: 33613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.266009 340720 task_exit.go:204] [ 33608: 33608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.266216 340720 task_signals.go:204] [ 33608: 33612] Signal 33608, PID: 33612, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.266370 340720 task_exit.go:204] [ 33608: 33608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.267122 340720 task_exit.go:204] [ 33608: 33612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.268709 340720 task_exit.go:204] [ 33610: 33613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.268811 340720 task_exit.go:204] [ 33610: 33613] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.268926 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 22:52:08 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) 22:52:08 executing program 3: rt_sigreturn() syz_open_dev$tty1(0xc, 0x4, 0x1) D0307 22:52:08.269531 340720 task_exit.go:204] [ 33610: 33610] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.270892 340720 task_exit.go:204] [ 33608: 33612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.271121 340720 task_exit.go:204] [ 33608: 33612] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.271224 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.271393 340720 task_exit.go:204] [ 33608: 33608] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.283562 340720 usertrap_amd64.go:212] [ 33611: 33611] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:08.283645 340720 usertrap_amd64.go:122] [ 33611: 33611] Allocate a new trap: 0xc00636d920 42 D0307 22:52:08.283722 340720 usertrap_amd64.go:225] [ 33611: 33611] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:08.290743 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.291202 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.291236 340720 task_exit.go:204] [ 33611: 33611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.291453 340720 task_exit.go:204] [ 33611: 33611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.291871 340720 task_signals.go:204] [ 33611: 33614] Signal 33611, PID: 33614, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.292116 340720 task_exit.go:204] [ 33611: 33614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.292619 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.293376 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.297732 340720 task_exit.go:204] [ 33611: 33614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.297811 340720 task_exit.go:204] [ 33611: 33614] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.297914 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:08.300090 340720 task_exit.go:204] [ 33611: 33611] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.300658 340720 usertrap_amd64.go:212] [ 33615: 33615] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:08.300783 340720 usertrap_amd64.go:122] [ 33615: 33615] Allocate a new trap: 0xc00bf78090 40 22:52:08 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) D0307 22:52:08.301480 340720 usertrap_amd64.go:225] [ 33615: 33615] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:08.308035 340720 usertrap_amd64.go:212] [ 33615: 33615] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:08.308172 340720 usertrap_amd64.go:122] [ 33615: 33615] Allocate a new trap: 0xc00bf78090 41 D0307 22:52:08.308258 340720 usertrap_amd64.go:225] [ 33615: 33615] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:08.310818 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.311462 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.319258 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.319543 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.330630 340720 usertrap_amd64.go:212] [ 33617: 33617] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:08.330735 340720 usertrap_amd64.go:122] [ 33617: 33617] Allocate a new trap: 0xc0004327e0 40 D0307 22:52:08.331274 340720 usertrap_amd64.go:225] [ 33617: 33617] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:08.332194 340720 usertrap_amd64.go:212] [ 33616: 33616] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:08.332338 340720 usertrap_amd64.go:122] [ 33616: 33616] Allocate a new trap: 0xc00996e090 40 D0307 22:52:08.332916 340720 usertrap_amd64.go:225] [ 33616: 33616] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:08.337107 340720 usertrap_amd64.go:212] [ 33616: 33616] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:08.337199 340720 usertrap_amd64.go:122] [ 33616: 33616] Allocate a new trap: 0xc00996e090 41 D0307 22:52:08.337280 340720 usertrap_amd64.go:225] [ 33616: 33616] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:08.337564 340720 usertrap_amd64.go:212] [ 33617: 33617] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:08.337642 340720 usertrap_amd64.go:122] [ 33617: 33617] Allocate a new trap: 0xc0004327e0 41 D0307 22:52:08.337706 340720 usertrap_amd64.go:225] [ 33617: 33617] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:08.339977 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.340431 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.340704 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.341390 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.348407 340720 usertrap_amd64.go:212] [ 33615: 33615] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:08.348515 340720 usertrap_amd64.go:122] [ 33615: 33615] Allocate a new trap: 0xc00bf78090 42 D0307 22:52:08.348589 340720 usertrap_amd64.go:225] [ 33615: 33615] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:08.355120 340720 usertrap_amd64.go:212] [ 33616: 33616] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.355205 340720 usertrap_amd64.go:122] [ 33616: 33616] Allocate a new trap: 0xc00996e090 42 D0307 22:52:08.355299 340720 usertrap_amd64.go:225] [ 33616: 33616] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.355138 340720 usertrap_amd64.go:212] [ 33618: 33618] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:08.356240 340720 usertrap_amd64.go:122] [ 33618: 33618] Allocate a new trap: 0xc002c020f0 39 D0307 22:52:08.356795 340720 usertrap_amd64.go:225] [ 33618: 33618] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:08.364809 340720 usertrap_amd64.go:212] [ 33618: 33618] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:08.364882 340720 usertrap_amd64.go:122] [ 33618: 33618] Allocate a new trap: 0xc002c020f0 40 D0307 22:52:08.364994 340720 usertrap_amd64.go:225] [ 33618: 33618] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:08.366039 340720 usertrap_amd64.go:212] [ 33617: 33617] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:08.366133 340720 usertrap_amd64.go:122] [ 33617: 33617] Allocate a new trap: 0xc0004327e0 42 D0307 22:52:08.366209 340720 usertrap_amd64.go:225] [ 33617: 33617] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:08.369772 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.370213 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.392612 340720 task_run.go:308] [ 33617: 33621] Unhandled user fault: addr=55e7d9158f8c ip=55e7d9158f8c access=r-x sig=11 err=operation not permitted D0307 22:52:08.392738 340720 task_log.go:87] [ 33617: 33621] Registers: D0307 22:52:08.392802 340720 task_log.go:94] [ 33617: 33621] Cs = 0000000000000033 D0307 22:52:08.392867 340720 task_log.go:94] [ 33617: 33621] Ds = 0000000000000000 D0307 22:52:08.392905 340720 task_log.go:94] [ 33617: 33621] Eflags = 0000000000050ac6 D0307 22:52:08.392984 340720 task_log.go:94] [ 33617: 33621] Es = 0000000000000000 D0307 22:52:08.393036 340720 task_log.go:94] [ 33617: 33621] Fs = 0000000000000000 D0307 22:52:08.393077 340720 task_log.go:94] [ 33617: 33621] Fs_base = 00007ea124187700 D0307 22:52:08.393128 340720 task_log.go:94] [ 33617: 33621] Gs = 0000000000000000 D0307 22:52:08.393159 340720 task_log.go:94] [ 33617: 33621] Gs_base = 00007fe3cc9f7000 D0307 22:52:08.393212 340720 task_log.go:94] [ 33617: 33621] Orig_rax = ffffffffffffffff D0307 22:52:08.393265 340720 task_log.go:94] [ 33617: 33621] R10 = 0000000000000000 D0307 22:52:08.393334 340720 task_log.go:94] [ 33617: 33621] R11 = ffffffff00000b87 D0307 22:52:08.393365 340720 task_log.go:94] [ 33617: 33621] R12 = 0000000000000000 D0307 22:52:08.393427 340720 task_log.go:94] [ 33617: 33621] R13 = 000055e7d9110190 D0307 22:52:08.393482 340720 task_log.go:94] [ 33617: 33621] R14 = 00000000000009fd D0307 22:52:08.393526 340720 task_log.go:94] [ 33617: 33621] R15 = 000000000cfc8ec9 D0307 22:52:08.393557 340720 task_log.go:94] [ 33617: 33621] R8 = 0000000000000000 D0307 22:52:08.393596 340720 task_log.go:94] [ 33617: 33621] R9 = 000055e7d9158f80 D0307 22:52:08.393667 340720 task_log.go:94] [ 33617: 33621] Rax = 0000000000000000 D0307 22:52:08.393713 340720 task_log.go:94] [ 33617: 33621] Rbp = 0000000000000000 D0307 22:52:08.393756 340720 task_log.go:94] [ 33617: 33621] Rbx = 0000000000000000 D0307 22:52:08.393806 340720 task_log.go:94] [ 33617: 33621] Rcx = 000055e7d9158f88 D0307 22:52:08.393860 340720 task_log.go:94] [ 33617: 33621] Rdi = 0000000000000000 D0307 22:52:08.393905 340720 task_log.go:94] [ 33617: 33621] Rdx = 0000000000000000 D0307 22:52:08.393957 340720 task_log.go:94] [ 33617: 33621] Rip = 000055e7d9158f8c D0307 22:52:08.393983 340720 task_log.go:94] [ 33617: 33621] Rsi = 0000000000000000 D0307 22:52:08.394007 340720 task_log.go:94] [ 33617: 33621] Rsp = 000055e7d9158f80 D0307 22:52:08.394057 340720 task_log.go:94] [ 33617: 33621] Ss = 000000000000002b D0307 22:52:08.394082 340720 task_log.go:111] [ 33617: 33621] Stack: D0307 22:52:08.394131 340720 task_log.go:128] [ 33617: 33621] 55e7d9158f80: 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394183 340720 task_log.go:128] [ 33617: 33621] 55e7d9158f90: 18 00 c0 23 a1 7e 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.394227 340720 task_log.go:128] [ 33617: 33621] 55e7d9158fa0: 01 00 00 00 00 00 00 00 87 0b 00 00 00 00 00 00 D0307 22:52:08.394266 340720 task_log.go:128] [ 33617: 33621] 55e7d9158fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394358 340720 task_log.go:128] [ 33617: 33621] 55e7d9158fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394423 340720 task_log.go:128] [ 33617: 33621] 55e7d9158fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394534 340720 task_log.go:128] [ 33617: 33621] 55e7d9158fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394627 340720 task_log.go:128] [ 33617: 33621] 55e7d9158ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394709 340720 task_log.go:128] [ 33617: 33621] 55e7d9159000: 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.394774 340720 task_log.go:128] [ 33617: 33621] 55e7d9159010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394853 340720 task_log.go:128] [ 33617: 33621] 55e7d9159020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394919 340720 task_log.go:128] [ 33617: 33621] 55e7d9159030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.394980 340720 task_log.go:128] [ 33617: 33621] 55e7d9159040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395064 340720 task_log.go:128] [ 33617: 33621] 55e7d9159050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395129 340720 task_log.go:128] [ 33617: 33621] 55e7d9159060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395190 340720 task_log.go:128] [ 33617: 33621] 55e7d9159070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395239 340720 task_log.go:128] [ 33617: 33621] 55e7d9159080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395728 340720 task_log.go:128] [ 33617: 33621] 55e7d9159090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395803 340720 task_log.go:128] [ 33617: 33621] 55e7d91590a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395892 340720 task_log.go:128] [ 33617: 33621] 55e7d91590b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.395961 340720 task_log.go:128] [ 33617: 33621] 55e7d91590c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396038 340720 task_log.go:128] [ 33617: 33621] 55e7d91590d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396123 340720 task_log.go:128] [ 33617: 33621] 55e7d91590e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396236 340720 task_log.go:128] [ 33617: 33621] 55e7d91590f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396308 340720 task_log.go:128] [ 33617: 33621] 55e7d9159100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396384 340720 task_log.go:128] [ 33617: 33621] 55e7d9159110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396420 340720 task_log.go:128] [ 33617: 33621] 55e7d9159120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396454 340720 task_log.go:128] [ 33617: 33621] 55e7d9159130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396486 340720 task_log.go:128] [ 33617: 33621] 55e7d9159140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396524 340720 task_log.go:128] [ 33617: 33621] 55e7d9159150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396556 340720 task_log.go:128] [ 33617: 33621] 55e7d9159160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.396618 340720 task_log.go:128] [ 33617: 33621] 55e7d9159170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397044 340720 task_log.go:128] [ 33617: 33621] 55e7d9159180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397117 340720 task_log.go:128] [ 33617: 33621] 55e7d9159190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397103 340720 usertrap_amd64.go:212] [ 33616: 33616] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.397195 340720 task_log.go:128] [ 33617: 33621] 55e7d91591a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397220 340720 usertrap_amd64.go:122] [ 33616: 33616] Allocate a new trap: 0xc00996e090 43 D0307 22:52:08.397263 340720 task_log.go:128] [ 33617: 33621] 55e7d91591b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397334 340720 usertrap_amd64.go:225] [ 33616: 33616] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.397332 340720 task_log.go:128] [ 33617: 33621] 55e7d91591c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397428 340720 task_log.go:128] [ 33617: 33621] 55e7d91591d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397489 340720 task_log.go:128] [ 33617: 33621] 55e7d91591e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397548 340720 task_log.go:128] [ 33617: 33621] 55e7d91591f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397627 340720 task_log.go:128] [ 33617: 33621] 55e7d9159200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397744 340720 task_log.go:128] [ 33617: 33621] 55e7d9159210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397834 340720 task_log.go:128] [ 33617: 33621] 55e7d9159220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397907 340720 task_log.go:128] [ 33617: 33621] 55e7d9159230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.397975 340720 task_log.go:128] [ 33617: 33621] 55e7d9159240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398041 340720 task_log.go:128] [ 33617: 33621] 55e7d9159250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398112 340720 task_log.go:128] [ 33617: 33621] 55e7d9159260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398193 340720 task_log.go:128] [ 33617: 33621] 55e7d9159270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398262 340720 task_log.go:128] [ 33617: 33621] 55e7d9159280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398324 340720 task_log.go:128] [ 33617: 33621] 55e7d9159290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398388 340720 task_log.go:128] [ 33617: 33621] 55e7d91592a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398466 340720 task_log.go:128] [ 33617: 33621] 55e7d91592b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398526 340720 task_log.go:128] [ 33617: 33621] 55e7d91592c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398594 340720 task_log.go:128] [ 33617: 33621] 55e7d91592d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398657 340720 task_log.go:128] [ 33617: 33621] 55e7d91592e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398711 340720 task_log.go:128] [ 33617: 33621] 55e7d91592f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398764 340720 task_log.go:128] [ 33617: 33621] 55e7d9159300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398815 340720 task_log.go:128] [ 33617: 33621] 55e7d9159310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398853 340720 task_log.go:128] [ 33617: 33621] 55e7d9159320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398929 340720 task_log.go:128] [ 33617: 33621] 55e7d9159330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.398986 340720 task_log.go:128] [ 33617: 33621] 55e7d9159340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399046 340720 task_log.go:128] [ 33617: 33621] 55e7d9159350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399100 340720 task_log.go:128] [ 33617: 33621] 55e7d9159360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399152 340720 task_log.go:128] [ 33617: 33621] 55e7d9159370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399197 340720 task_log.go:149] [ 33617: 33621] Code: D0307 22:52:08.399271 340720 task_log.go:167] [ 33617: 33621] 55e7d9158f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399347 340720 task_log.go:167] [ 33617: 33621] 55e7d9158f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399418 340720 task_log.go:167] [ 33617: 33621] 55e7d9158f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399496 340720 task_log.go:167] [ 33617: 33621] 55e7d9158f70: 80 8f 15 d9 e7 55 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399553 340720 task_log.go:167] [ 33617: 33621] 55e7d9158f80: 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399625 340720 task_log.go:167] [ 33617: 33621] 55e7d9158f90: 18 00 c0 23 a1 7e 00 00 ff ff ff ff ff ff ff ff D0307 22:52:08.399679 340720 task_log.go:167] [ 33617: 33621] 55e7d9158fa0: 01 00 00 00 00 00 00 00 87 0b 00 00 00 00 00 00 D0307 22:52:08.399746 340720 task_log.go:167] [ 33617: 33621] 55e7d9158fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0307 22:52:08.399779 340720 task_log.go:71] [ 33617: 33621] Mappings: VMAs: 00068000-0006d000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2c320000-1b2c920000 rw-s 00000000 00:04 11 /memfd:syz-shared-mem (deleted) 55e7d8fad000-55e7d8fd1000 r--p 00000000 00:08 8 /syz-executor 55e7d8fd1000-55e7d9083000 r-xp 00024000 00:08 8 /syz-executor 55e7d9083000-55e7d90d5000 r--p 000d6000 00:08 8 /syz-executor 55e7d90d6000-55e7d912f000 r--p 00128000 00:08 8 /syz-executor 55e7d912f000-55e7d9138000 rw-p 00181000 00:08 8 /syz-executor 55e7d913d000-55e7d9c89000 rw-p 00000000 00:00 0 55e7d9c89000-55e7d9cab000 rw-p 00000000 00:00 0 [heap] 7ea123c00000-7ea124000000 r--p 00000000 00:04 10 /memfd:syz-shared-mem (deleted) 7ea124167000-7ea124168000 ---p 00000000 00:00 0 7ea124168000-7ea124188000 rw-p 00000000 00:00 0 7ea124188000-7ea124189000 r--p 00000000 00:00 0 [vvar] 7ea124189000-7ea12418b000 r-xp 00000000 00:00 0 7ed7ba5cf000-7ed7badcf000 rw-p 00000000 00:00 0 [stack] PMAs: 00068000-00069000 r-xp 06bf1000 *pgalloc.MemoryFile 00069000-0006d000 r-xp 03d81000 *pgalloc.MemoryFile 1b2c320000-1b2c920000 rw-s 0e200000 *pgalloc.MemoryFile 55e7d8fad000-55e7d8fd1000 r--p 0672b000 *pgalloc.MemoryFile 55e7d8fd1000-55e7d8fea000 r-xs 00024000 *gofer.dentryPlatformFile 55e7d8fea000-55e7d8feb000 r-xp 04625000 *pgalloc.MemoryFile 55e7d8feb000-55e7d8fec000 r-xp 03ddf000 *pgalloc.MemoryFile 55e7d8fec000-55e7d8fed000 r-xp 03d79000 *pgalloc.MemoryFile 55e7d8fed000-55e7d8ff2000 r-xs 00040000 *gofer.dentryPlatformFile 55e7d8ff2000-55e7d8ff3000 r-xp 04650000 *pgalloc.MemoryFile 55e7d8ff3000-55e7d9036000 r-xs 00046000 *gofer.dentryPlatformFile 55e7d9036000-55e7d9037000 r-xp 04634000 *pgalloc.MemoryFile 55e7d9037000-55e7d9038000 r-xp 04624000 *pgalloc.MemoryFile 55e7d9038000-55e7d9039000 r-xp 06f8b000 *pgalloc.MemoryFile 55e7d9039000-55e7d903a000 r-xp 03d85000 *pgalloc.MemoryFile 55e7d903a000-55e7d903b000 r-xp 072ef000 *pgalloc.MemoryFile 55e7d903b000-55e7d905d000 r-xs 0008e000 *gofer.dentryPlatformFile 55e7d905d000-55e7d905e000 r-xp 04635000 *pgalloc.MemoryFile 55e7d905e000-55e7d905f000 r-xp 06d02000 *pgalloc.MemoryFile 55e7d9076000-55e7d9077000 r-xp 04626000 *pgalloc.MemoryFile 55e7d9082000-55e7d9083000 r-xp 01d38000 *pgalloc.MemoryFile 55e7d9083000-55e7d90d5000 r--p 06fb7000 *pgalloc.MemoryFile 55e7d90d6000-55e7d9138000 rw-p 0fc9a000 *pgalloc.MemoryFile 55e7d913d000-55e7d9200000 rw-p 1350e000 *pgalloc.MemoryFile 55e7d9c00000-55e7d9c89000 rw-p 0fff2000 *pgalloc.MemoryFile 55e7d9c89000-55e7d9c8a000 rw-p 06af6000 *pgalloc.MemoryFile 55e7d9c8a000-55e7d9cab000 rw-p 0fb88000 *pgalloc.MemoryFile 7ea123c00000-7ea124000000 r--s 0de00000 *pgalloc.MemoryFile 7ea124168000-7ea124188000 rw-p 08dbf000 *pgalloc.MemoryFile 7ea124188000-7ea124189000 r--s 00002000 *pgalloc.MemoryFile 7ea124189000-7ea12418b000 r-xs 00000000 *pgalloc.MemoryFile 7ed7bac00000-7ed7badcb000 r--p 07a00000 *pgalloc.MemoryFile 7ed7badcb000-7ed7badcd000 r--p 07210000 *pgalloc.MemoryFile 7ed7badcd000-7ed7badcf000 rw-p 0724c000 *pgalloc.MemoryFile D0307 22:52:08.401563 340720 task_log.go:73] [ 33617: 33621] FDTable: fd:200 => name /dev/net/tun fd:201 => name / fd:0 => name pipe:[3454] fd:1 => name pipe:[3454] fd:2 => name pipe:[3454] D0307 22:52:08.401486 340720 task_exit.go:204] [ 33616: 33616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.402030 340720 task_signals.go:470] [ 33617: 33621] Notified of signal 11 D0307 22:52:08.402121 340720 task_signals.go:220] [ 33617: 33621] Signal 11: delivering to handler D0307 22:52:08.402437 340720 task_signals.go:204] [ 33616: 33620] Signal 33616, PID: 33620, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.402627 340720 task_exit.go:204] [ 33616: 33616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.402801 340720 task_exit.go:204] [ 33616: 33620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.406606 340720 task_exit.go:204] [ 33616: 33620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.406670 340720 task_exit.go:204] [ 33616: 33620] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.406770 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:08.407898 340720 task_signals.go:470] [ 33617: 33621] Notified of signal 7 D0307 22:52:08.407993 340720 task_signals.go:220] [ 33617: 33621] Signal 7: delivering to handler D0307 22:52:08.408224 340720 task_exit.go:204] [ 33616: 33616] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.409063 340720 usertrap_amd64.go:212] [ 33617: 33617] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.409143 340720 usertrap_amd64.go:122] [ 33617: 33617] Allocate a new trap: 0xc0004327e0 43 D0307 22:52:08.409281 340720 usertrap_amd64.go:225] [ 33617: 33617] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.409152 340720 usertrap_amd64.go:212] [ 33615: 33615] Found the pattern at ip 55def6d09fa4:sysno 3 22:52:08 executing program 1: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) D0307 22:52:08.409749 340720 usertrap_amd64.go:122] [ 33615: 33615] Allocate a new trap: 0xc00bf78090 43 D0307 22:52:08.409834 340720 usertrap_amd64.go:225] [ 33615: 33615] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:08.412986 340720 task_exit.go:204] [ 33617: 33617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.413153 340720 task_signals.go:204] [ 33617: 33621] Signal 33617, PID: 33621, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.413315 340720 task_exit.go:204] [ 33617: 33621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.413453 340720 task_exit.go:204] [ 33617: 33617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.414147 340720 task_exit.go:204] [ 33615: 33615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.414333 340720 task_exit.go:204] [ 33615: 33615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.414710 340720 task_signals.go:204] [ 33615: 33619] Signal 33615, PID: 33619, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.414861 340720 task_exit.go:204] [ 33615: 33619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.417582 340720 task_exit.go:204] [ 33617: 33621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.417674 340720 task_exit.go:204] [ 33617: 33621] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.417762 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.418401 340720 task_exit.go:204] [ 33617: 33617] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.420175 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.420862 340720 task_exit.go:204] [ 33615: 33619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.420982 340720 task_exit.go:204] [ 33615: 33619] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.421133 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:08.421443 340720 task_exit.go:204] [ 33615: 33615] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.421543 340720 usertrap_amd64.go:212] [ 33618: 33618] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:08.421696 340720 usertrap_amd64.go:122] [ 33618: 33618] Allocate a new trap: 0xc002c020f0 41 D0307 22:52:08.421791 340720 usertrap_amd64.go:225] [ 33618: 33618] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:08.423669 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x540e, 0x0) 22:52:08 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001080), 0x8802, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) D0307 22:52:08.429067 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.429594 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.430118 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.430596 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.475280 340720 usertrap_amd64.go:212] [ 33624: 33624] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:08.475881 340720 usertrap_amd64.go:122] [ 33624: 33624] Allocate a new trap: 0xc00275c300 40 D0307 22:52:08.475568 340720 usertrap_amd64.go:212] [ 33618: 33618] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:08.476189 340720 usertrap_amd64.go:122] [ 33618: 33618] Allocate a new trap: 0xc002c020f0 42 D0307 22:52:08.476288 340720 usertrap_amd64.go:225] [ 33618: 33618] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:08.476559 340720 usertrap_amd64.go:225] [ 33624: 33624] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:08.481204 340720 usertrap_amd64.go:212] [ 33623: 33623] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:08.481357 340720 usertrap_amd64.go:122] [ 33623: 33623] Allocate a new trap: 0xc002c021b0 40 D0307 22:52:08.481562 340720 usertrap_amd64.go:212] [ 33624: 33624] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:08.481636 340720 usertrap_amd64.go:122] [ 33624: 33624] Allocate a new trap: 0xc00275c300 41 D0307 22:52:08.481725 340720 usertrap_amd64.go:225] [ 33624: 33624] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:08.481930 340720 usertrap_amd64.go:225] [ 33623: 33623] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:08.484288 340720 usertrap_amd64.go:212] [ 33623: 33623] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:08.484362 340720 usertrap_amd64.go:122] [ 33623: 33623] Allocate a new trap: 0xc002c021b0 41 D0307 22:52:08.484438 340720 usertrap_amd64.go:225] [ 33623: 33623] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:08.484852 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.485998 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.487321 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.487766 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.495742 340720 usertrap_amd64.go:212] [ 33625: 33625] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:08.495860 340720 usertrap_amd64.go:122] [ 33625: 33625] Allocate a new trap: 0xc00bf78210 40 D0307 22:52:08.496333 340720 usertrap_amd64.go:225] [ 33625: 33625] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:08.499882 340720 task_exit.go:204] [ 33618: 33618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.500084 340720 task_exit.go:204] [ 33618: 33618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.500824 340720 task_signals.go:204] [ 33618: 33622] Signal 33618, PID: 33622, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.500933 340720 task_exit.go:204] [ 33618: 33622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.501054 340720 usertrap_amd64.go:212] [ 33625: 33625] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:08.501156 340720 usertrap_amd64.go:122] [ 33625: 33625] Allocate a new trap: 0xc00bf78210 41 D0307 22:52:08.501270 340720 usertrap_amd64.go:225] [ 33625: 33625] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:08.506563 340720 task_exit.go:204] [ 33618: 33622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.506632 340720 task_exit.go:204] [ 33618: 33622] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.506732 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:08.507017 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.507346 340720 task_exit.go:204] [ 33618: 33618] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.507381 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:08 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x141bc2, 0x1c0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './bus', [{}], 0xa, "7ddf8e46ebe50ab1a7fda8b5a159dd9094b7a725a95e3d0281aac50d2716aed33833b3393aae281695ef3150a1167b7dfd9a525245b379e9323dfe7a6318eb861c"}, 0x4b) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141242, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x2) fallocate(r1, 0x0, 0x0, 0xfe7800) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000100), 0x8) ftruncate(r2, 0x9) fallocate(r0, 0x20, 0x0, 0x4010000) ftruncate(r0, 0x0) D0307 22:52:08.513758 340720 usertrap_amd64.go:212] [ 33623: 33623] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.513843 340720 usertrap_amd64.go:122] [ 33623: 33623] Allocate a new trap: 0xc002c021b0 42 D0307 22:52:08.513953 340720 usertrap_amd64.go:225] [ 33623: 33623] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.518485 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.518956 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.520383 340720 usertrap_amd64.go:212] [ 33624: 33624] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:08.520477 340720 usertrap_amd64.go:122] [ 33624: 33624] Allocate a new trap: 0xc00275c300 42 D0307 22:52:08.520575 340720 usertrap_amd64.go:225] [ 33624: 33624] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:08.523070 340720 usertrap_amd64.go:212] [ 33625: 33625] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:08.523158 340720 usertrap_amd64.go:122] [ 33625: 33625] Allocate a new trap: 0xc00bf78210 42 D0307 22:52:08.523252 340720 usertrap_amd64.go:225] [ 33625: 33625] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:08.546720 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.547149 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.550075 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.550185 340720 usertrap_amd64.go:212] [ 33625: 33625] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.550244 340720 usertrap_amd64.go:122] [ 33625: 33625] Allocate a new trap: 0xc00bf78210 43 D0307 22:52:08.550312 340720 usertrap_amd64.go:225] [ 33625: 33625] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.550730 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.553907 340720 usertrap_amd64.go:212] [ 33624: 33624] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:08.554136 340720 usertrap_amd64.go:122] [ 33624: 33624] Allocate a new trap: 0xc00275c300 43 D0307 22:52:08.554285 340720 usertrap_amd64.go:225] [ 33624: 33624] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:08.554958 340720 usertrap_amd64.go:212] [ 33623: 33623] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.555004 340720 usertrap_amd64.go:122] [ 33623: 33623] Allocate a new trap: 0xc002c021b0 43 D0307 22:52:08.555060 340720 usertrap_amd64.go:225] [ 33623: 33623] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.558130 340720 task_exit.go:204] [ 33625: 33625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.558357 340720 task_exit.go:204] [ 33625: 33625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.559316 340720 task_signals.go:204] [ 33624: 33627] Signal 33624, PID: 33627, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.559514 340720 task_exit.go:204] [ 33624: 33627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.559705 340720 task_signals.go:204] [ 33625: 33628] Signal 33625, PID: 33628, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.560324 340720 task_exit.go:204] [ 33624: 33624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.560463 340720 task_exit.go:204] [ 33625: 33628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.560781 340720 task_exit.go:204] [ 33624: 33627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.560885 340720 task_exit.go:204] [ 33624: 33627] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.563397 340720 task_exit.go:204] [ 33623: 33623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.563679 340720 task_exit.go:204] [ 33623: 33623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.563965 340720 task_signals.go:204] [ 33623: 33626] Signal 33623, PID: 33626, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.564060 340720 task_exit.go:204] [ 33623: 33626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.564603 340720 task_exit.go:204] [ 33625: 33628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.564668 340720 task_exit.go:204] [ 33625: 33628] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.564772 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.566024 340720 task_exit.go:204] [ 33624: 33624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.566159 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:08.566272 340720 task_exit.go:204] [ 33625: 33625] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.567165 340720 task_exit.go:204] [ 33624: 33624] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.567340 340720 task_exit.go:204] [ 33623: 33626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.567386 340720 task_exit.go:204] [ 33623: 33626] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.567453 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:08.569500 340720 task_exit.go:204] [ 33623: 33623] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x540e, 0x0) 22:52:08 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001080), 0x8802, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) D0307 22:52:08.574842 340720 usertrap_amd64.go:212] [ 33629: 33629] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:08.574977 340720 usertrap_amd64.go:122] [ 33629: 33629] Allocate a new trap: 0xc0069a2930 39 D0307 22:52:08.575576 340720 usertrap_amd64.go:225] [ 33629: 33629] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:08.577900 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.578298 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.580622 340720 usertrap_amd64.go:212] [ 33629: 33629] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:08.580760 340720 usertrap_amd64.go:122] [ 33629: 33629] Allocate a new trap: 0xc0069a2930 40 D0307 22:52:08.580731 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.580830 340720 usertrap_amd64.go:225] [ 33629: 33629] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) 22:52:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, 0x0, 0x0) D0307 22:52:08.581603 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.584989 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.585729 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.586013 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.586467 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.615546 340720 usertrap_amd64.go:212] [ 33630: 33630] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:08.615701 340720 usertrap_amd64.go:122] [ 33630: 33630] Allocate a new trap: 0xc00275c5d0 40 D0307 22:52:08.616374 340720 usertrap_amd64.go:225] [ 33630: 33630] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:08.616803 340720 usertrap_amd64.go:212] [ 33632: 33632] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:08.616971 340720 usertrap_amd64.go:122] [ 33632: 33632] Allocate a new trap: 0xc00636c120 40 D0307 22:52:08.617664 340720 usertrap_amd64.go:212] [ 33631: 33631] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:08.617776 340720 usertrap_amd64.go:122] [ 33631: 33631] Allocate a new trap: 0xc00636c0f0 40 D0307 22:52:08.618224 340720 usertrap_amd64.go:212] [ 33629: 33629] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:08.618273 340720 usertrap_amd64.go:122] [ 33629: 33629] Allocate a new trap: 0xc0069a2930 41 D0307 22:52:08.618332 340720 usertrap_amd64.go:225] [ 33629: 33629] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:08.618531 340720 usertrap_amd64.go:225] [ 33631: 33631] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:08.619770 340720 usertrap_amd64.go:212] [ 33630: 33630] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:08.619859 340720 usertrap_amd64.go:122] [ 33630: 33630] Allocate a new trap: 0xc00275c5d0 41 D0307 22:52:08.619940 340720 usertrap_amd64.go:225] [ 33630: 33630] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:08.621268 340720 usertrap_amd64.go:225] [ 33632: 33632] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:08.621464 340720 usertrap_amd64.go:212] [ 33631: 33631] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:08.621557 340720 usertrap_amd64.go:122] [ 33631: 33631] Allocate a new trap: 0xc00636c0f0 41 D0307 22:52:08.621646 340720 usertrap_amd64.go:225] [ 33631: 33631] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:08.623746 340720 usertrap_amd64.go:212] [ 33632: 33632] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:08.623812 340720 usertrap_amd64.go:122] [ 33632: 33632] Allocate a new trap: 0xc00636c120 41 D0307 22:52:08.623895 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.624237 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.624845 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.625140 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.623913 340720 usertrap_amd64.go:225] [ 33632: 33632] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:08.627525 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.628158 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.637688 340720 usertrap_amd64.go:212] [ 33631: 33631] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.637777 340720 usertrap_amd64.go:122] [ 33631: 33631] Allocate a new trap: 0xc00636c0f0 42 D0307 22:52:08.637846 340720 usertrap_amd64.go:225] [ 33631: 33631] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.644365 340720 usertrap_amd64.go:212] [ 33630: 33630] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:08.644434 340720 usertrap_amd64.go:122] [ 33630: 33630] Allocate a new trap: 0xc00275c5d0 42 D0307 22:52:08.644526 340720 usertrap_amd64.go:225] [ 33630: 33630] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:08.654208 340720 usertrap_amd64.go:212] [ 33631: 33631] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.654372 340720 usertrap_amd64.go:122] [ 33631: 33631] Allocate a new trap: 0xc00636c0f0 43 D0307 22:52:08.654431 340720 usertrap_amd64.go:225] [ 33631: 33631] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.658574 340720 usertrap_amd64.go:212] [ 33629: 33629] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:08.658642 340720 usertrap_amd64.go:122] [ 33629: 33629] Allocate a new trap: 0xc0069a2930 42 D0307 22:52:08.658724 340720 usertrap_amd64.go:225] [ 33629: 33629] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:08.658750 340720 task_exit.go:204] [ 33631: 33631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.659361 340720 task_exit.go:204] [ 33631: 33631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.660201 340720 task_signals.go:204] [ 33631: 33634] Signal 33631, PID: 33634, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.660280 340720 task_exit.go:204] [ 33631: 33634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.662864 340720 task_exit.go:204] [ 33629: 33629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.663399 340720 task_signals.go:204] [ 33629: 33633] Signal 33629, PID: 33633, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.663543 340720 task_exit.go:204] [ 33629: 33633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.663920 340720 task_exit.go:204] [ 33629: 33629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.664791 340720 task_exit.go:204] [ 33631: 33634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.664871 340720 task_exit.go:204] [ 33631: 33634] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.665013 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:08.665900 340720 task_exit.go:204] [ 33631: 33631] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, 0x0, 0x0) D0307 22:52:08.667884 340720 task_exit.go:204] [ 33629: 33633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.667973 340720 task_exit.go:204] [ 33629: 33633] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.668049 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:08.668405 340720 task_exit.go:204] [ 33629: 33629] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.673924 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.674645 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5421, &(0x7f0000000040)=ANY=[]) D0307 22:52:08.677916 340720 usertrap_amd64.go:212] [ 33630: 33630] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:08.678089 340720 usertrap_amd64.go:122] [ 33630: 33630] Allocate a new trap: 0xc00275c5d0 43 D0307 22:52:08.678212 340720 usertrap_amd64.go:225] [ 33630: 33630] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:08.678585 340720 usertrap_amd64.go:212] [ 33632: 33632] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:08.678736 340720 usertrap_amd64.go:122] [ 33632: 33632] Allocate a new trap: 0xc00636c120 42 D0307 22:52:08.678932 340720 usertrap_amd64.go:225] [ 33632: 33632] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:08.680273 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.680785 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.681103 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.681416 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.682482 340720 task_exit.go:204] [ 33630: 33630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.682746 340720 task_exit.go:204] [ 33630: 33630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.683705 340720 task_signals.go:204] [ 33630: 33635] Signal 33630, PID: 33635, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.684112 340720 task_exit.go:204] [ 33630: 33635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.688445 340720 task_exit.go:204] [ 33630: 33635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.688523 340720 task_exit.go:204] [ 33630: 33635] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.688633 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:08.689714 340720 task_exit.go:204] [ 33630: 33630] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.689872 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.690269 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:08 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001080), 0x8802, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) D0307 22:52:08.692440 340720 usertrap_amd64.go:212] [ 33632: 33632] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.692562 340720 usertrap_amd64.go:122] [ 33632: 33632] Allocate a new trap: 0xc00636c120 43 D0307 22:52:08.692651 340720 usertrap_amd64.go:225] [ 33632: 33632] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.698794 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.699232 340720 task_exit.go:204] [ 33632: 33632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.699285 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.699614 340720 task_exit.go:204] [ 33632: 33632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.699734 340720 task_signals.go:204] [ 33632: 33636] Signal 33632, PID: 33636, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.699845 340720 task_exit.go:204] [ 33632: 33636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.705133 340720 task_exit.go:204] [ 33632: 33636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.705201 340720 task_exit.go:204] [ 33632: 33636] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.705346 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.706959 340720 task_exit.go:204] [ 33632: 33632] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x540e, 0x0) D0307 22:52:08.717069 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.717483 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.727539 340720 usertrap_amd64.go:212] [ 33638: 33638] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:08.727629 340720 usertrap_amd64.go:122] [ 33638: 33638] Allocate a new trap: 0xc00996e1b0 39 D0307 22:52:08.728090 340720 usertrap_amd64.go:225] [ 33638: 33638] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:08.731285 340720 usertrap_amd64.go:212] [ 33638: 33638] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:08.731440 340720 usertrap_amd64.go:122] [ 33638: 33638] Allocate a new trap: 0xc00996e1b0 40 D0307 22:52:08.731534 340720 usertrap_amd64.go:225] [ 33638: 33638] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:08.732589 340720 usertrap_amd64.go:212] [ 33637: 33637] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:08.732777 340720 usertrap_amd64.go:122] [ 33637: 33637] Allocate a new trap: 0xc001890360 40 D0307 22:52:08.733380 340720 usertrap_amd64.go:225] [ 33637: 33637] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:08.737106 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.737524 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.747211 340720 usertrap_amd64.go:212] [ 33637: 33637] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:08.747344 340720 usertrap_amd64.go:122] [ 33637: 33637] Allocate a new trap: 0xc001890360 41 D0307 22:52:08.747409 340720 usertrap_amd64.go:225] [ 33637: 33637] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:08.750502 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.752081 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.760077 340720 usertrap_amd64.go:212] [ 33640: 33640] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:08.760222 340720 usertrap_amd64.go:122] [ 33640: 33640] Allocate a new trap: 0xc00bf78510 40 D0307 22:52:08.761244 340720 usertrap_amd64.go:225] [ 33640: 33640] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:08.765408 340720 usertrap_amd64.go:212] [ 33638: 33638] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:08.765486 340720 usertrap_amd64.go:122] [ 33638: 33638] Allocate a new trap: 0xc00996e1b0 41 D0307 22:52:08.765614 340720 usertrap_amd64.go:225] [ 33638: 33638] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:08.767803 340720 usertrap_amd64.go:212] [ 33639: 33639] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:08.767875 340720 usertrap_amd64.go:122] [ 33639: 33639] Allocate a new trap: 0xc0018903c0 40 D0307 22:52:08.768416 340720 usertrap_amd64.go:225] [ 33639: 33639] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:08.774639 340720 usertrap_amd64.go:212] [ 33640: 33640] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:08.774742 340720 usertrap_amd64.go:122] [ 33640: 33640] Allocate a new trap: 0xc00bf78510 41 D0307 22:52:08.774838 340720 usertrap_amd64.go:225] [ 33640: 33640] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:08.776858 340720 usertrap_amd64.go:212] [ 33639: 33639] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:08.776985 340720 usertrap_amd64.go:122] [ 33639: 33639] Allocate a new trap: 0xc0018903c0 41 D0307 22:52:08.777080 340720 usertrap_amd64.go:225] [ 33639: 33639] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:08.780304 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.780705 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.781012 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.781889 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.785123 340720 usertrap_amd64.go:212] [ 33637: 33637] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.785198 340720 usertrap_amd64.go:122] [ 33637: 33637] Allocate a new trap: 0xc001890360 42 D0307 22:52:08.785277 340720 usertrap_amd64.go:225] [ 33637: 33637] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.798187 340720 usertrap_amd64.go:212] [ 33638: 33638] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:08.798332 340720 usertrap_amd64.go:122] [ 33638: 33638] Allocate a new trap: 0xc00996e1b0 42 D0307 22:52:08.798446 340720 usertrap_amd64.go:225] [ 33638: 33638] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:08.802001 340720 task_exit.go:204] [ 33638: 33638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.802332 340720 task_signals.go:204] [ 33638: 33641] Signal 33638, PID: 33641, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.802476 340720 task_exit.go:204] [ 33638: 33641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.803024 340720 task_exit.go:204] [ 33638: 33638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.806342 340720 task_exit.go:204] [ 33638: 33641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.806476 340720 task_exit.go:204] [ 33638: 33641] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.806592 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:08.810509 340720 task_exit.go:204] [ 33638: 33638] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.812992 340720 usertrap_amd64.go:212] [ 33640: 33640] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:08.813080 340720 usertrap_amd64.go:122] [ 33640: 33640] Allocate a new trap: 0xc00bf78510 42 D0307 22:52:08.813124 340720 usertrap_amd64.go:212] [ 33639: 33639] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:08.813675 340720 usertrap_amd64.go:122] [ 33639: 33639] Allocate a new trap: 0xc0018903c0 42 D0307 22:52:08.813705 340720 usertrap_amd64.go:225] [ 33640: 33640] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:08.813751 340720 usertrap_amd64.go:225] [ 33639: 33639] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) 22:52:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5421, &(0x7f0000000040)=ANY=[]) D0307 22:52:08.822577 340720 usertrap_amd64.go:212] [ 33637: 33637] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.822688 340720 usertrap_amd64.go:122] [ 33637: 33637] Allocate a new trap: 0xc001890360 43 D0307 22:52:08.822786 340720 usertrap_amd64.go:225] [ 33637: 33637] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.823393 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.824125 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.825529 340720 usertrap_amd64.go:212] [ 33640: 33640] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.825631 340720 usertrap_amd64.go:122] [ 33640: 33640] Allocate a new trap: 0xc00bf78510 43 D0307 22:52:08.825743 340720 usertrap_amd64.go:225] [ 33640: 33640] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.826249 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.826802 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.827091 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.827598 340720 task_exit.go:204] [ 33637: 33637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.827823 340720 task_exit.go:204] [ 33637: 33637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.828069 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.828175 340720 task_signals.go:204] [ 33637: 33642] Signal 33637, PID: 33642, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.828280 340720 task_exit.go:204] [ 33637: 33642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.829935 340720 usertrap_amd64.go:212] [ 33639: 33639] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:08.830019 340720 usertrap_amd64.go:122] [ 33639: 33639] Allocate a new trap: 0xc0018903c0 43 D0307 22:52:08.830154 340720 usertrap_amd64.go:225] [ 33639: 33639] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:08.832451 340720 task_exit.go:204] [ 33637: 33642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.832566 340720 task_exit.go:204] [ 33637: 33642] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.832654 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:08.835137 340720 task_exit.go:204] [ 33637: 33637] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.835526 340720 task_exit.go:204] [ 33640: 33640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.835870 340720 task_exit.go:204] [ 33640: 33640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.836124 340720 task_signals.go:204] [ 33640: 33644] Signal 33640, PID: 33644, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.836281 340720 task_exit.go:204] [ 33640: 33644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.837032 340720 task_exit.go:204] [ 33639: 33639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.837527 340720 task_exit.go:204] [ 33639: 33639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.837524 340720 task_signals.go:204] [ 33639: 33643] Signal 33639, PID: 33643, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.837653 340720 task_exit.go:204] [ 33639: 33643] Transitioning from exit state TaskExitNone to TaskExitInitiated 22:52:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, 0x0, 0x0) D0307 22:52:08.843343 340720 task_exit.go:204] [ 33640: 33644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.843433 340720 task_exit.go:204] [ 33640: 33644] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.843588 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.844292 340720 task_exit.go:204] [ 33640: 33640] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.845879 340720 task_exit.go:204] [ 33639: 33643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.845934 340720 task_exit.go:204] [ 33639: 33643] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.846019 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 22:52:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x540e, 0x0) D0307 22:52:08.848528 340720 task_exit.go:204] [ 33639: 33639] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001080), 0x8802, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) D0307 22:52:08.853821 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.854649 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.856479 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.857110 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.861984 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.863028 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.872650 340720 usertrap_amd64.go:212] [ 33645: 33645] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:08.872806 340720 usertrap_amd64.go:122] [ 33645: 33645] Allocate a new trap: 0xc004f82570 39 D0307 22:52:08.873549 340720 usertrap_amd64.go:225] [ 33645: 33645] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:08.884049 340720 usertrap_amd64.go:212] [ 33647: 33647] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:08.884167 340720 usertrap_amd64.go:122] [ 33647: 33647] Allocate a new trap: 0xc001890750 40 D0307 22:52:08.884637 340720 usertrap_amd64.go:225] [ 33647: 33647] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:08.885869 340720 usertrap_amd64.go:212] [ 33645: 33645] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:08.885967 340720 usertrap_amd64.go:122] [ 33645: 33645] Allocate a new trap: 0xc004f82570 40 D0307 22:52:08.886031 340720 usertrap_amd64.go:225] [ 33645: 33645] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:08.893249 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.893651 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.897116 340720 usertrap_amd64.go:212] [ 33646: 33646] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:08.897232 340720 usertrap_amd64.go:122] [ 33646: 33646] Allocate a new trap: 0xc0069a2cf0 40 D0307 22:52:08.897739 340720 usertrap_amd64.go:225] [ 33646: 33646] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:08.898988 340720 usertrap_amd64.go:212] [ 33647: 33647] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:08.899100 340720 usertrap_amd64.go:122] [ 33647: 33647] Allocate a new trap: 0xc001890750 41 D0307 22:52:08.899297 340720 usertrap_amd64.go:225] [ 33647: 33647] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:08.911684 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.914015 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.914711 340720 usertrap_amd64.go:212] [ 33646: 33646] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:08.914781 340720 usertrap_amd64.go:122] [ 33646: 33646] Allocate a new trap: 0xc0069a2cf0 41 D0307 22:52:08.914852 340720 usertrap_amd64.go:225] [ 33646: 33646] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:08.916500 340720 usertrap_amd64.go:212] [ 33648: 33648] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:08.917099 340720 usertrap_amd64.go:122] [ 33648: 33648] Allocate a new trap: 0xc00bf785d0 40 D0307 22:52:08.917825 340720 usertrap_amd64.go:225] [ 33648: 33648] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:08.920427 340720 usertrap_amd64.go:212] [ 33645: 33645] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:08.920521 340720 usertrap_amd64.go:122] [ 33645: 33645] Allocate a new trap: 0xc004f82570 41 D0307 22:52:08.920611 340720 usertrap_amd64.go:225] [ 33645: 33645] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:08.921044 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.921221 340720 usertrap_amd64.go:212] [ 33648: 33648] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:08.921317 340720 usertrap_amd64.go:122] [ 33648: 33648] Allocate a new trap: 0xc00bf785d0 41 D0307 22:52:08.921402 340720 usertrap_amd64.go:225] [ 33648: 33648] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:08.921475 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.924235 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:08.925080 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.938559 340720 usertrap_amd64.go:212] [ 33647: 33647] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:08.938682 340720 usertrap_amd64.go:122] [ 33647: 33647] Allocate a new trap: 0xc001890750 42 D0307 22:52:08.938803 340720 usertrap_amd64.go:225] [ 33647: 33647] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:08.947031 340720 usertrap_amd64.go:212] [ 33645: 33645] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:08.947132 340720 usertrap_amd64.go:122] [ 33645: 33645] Allocate a new trap: 0xc004f82570 42 D0307 22:52:08.947216 340720 usertrap_amd64.go:225] [ 33645: 33645] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:08.950599 340720 usertrap_amd64.go:212] [ 33648: 33648] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:08.950663 340720 usertrap_amd64.go:122] [ 33648: 33648] Allocate a new trap: 0xc00bf785d0 42 D0307 22:52:08.950726 340720 usertrap_amd64.go:225] [ 33648: 33648] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:08.952454 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.952776 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.955580 340720 usertrap_amd64.go:212] [ 33647: 33647] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:08.955639 340720 usertrap_amd64.go:122] [ 33647: 33647] Allocate a new trap: 0xc001890750 43 D0307 22:52:08.955691 340720 usertrap_amd64.go:225] [ 33647: 33647] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:08.956583 340720 usertrap_amd64.go:212] [ 33646: 33646] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:08.956674 340720 usertrap_amd64.go:122] [ 33646: 33646] Allocate a new trap: 0xc0069a2cf0 42 D0307 22:52:08.956740 340720 usertrap_amd64.go:225] [ 33646: 33646] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:08.960681 340720 task_exit.go:204] [ 33645: 33645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.960869 340720 task_exit.go:204] [ 33645: 33645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.961413 340720 task_signals.go:204] [ 33645: 33649] Signal 33645, PID: 33649, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.961567 340720 task_exit.go:204] [ 33645: 33649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.961838 340720 task_exit.go:204] [ 33647: 33647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.962062 340720 task_exit.go:204] [ 33647: 33647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.964581 340720 task_signals.go:204] [ 33647: 33650] Signal 33647, PID: 33650, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.964766 340720 task_exit.go:204] [ 33647: 33650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.965491 340720 task_exit.go:204] [ 33645: 33649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.965573 340720 task_exit.go:204] [ 33645: 33649] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.965676 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:08.966055 340720 task_exit.go:204] [ 33645: 33645] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5421, &(0x7f0000000040)=ANY=[]) D0307 22:52:08.968515 340720 task_exit.go:204] [ 33647: 33650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.968629 340720 task_exit.go:204] [ 33647: 33650] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.968729 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:08.968840 340720 task_exit.go:204] [ 33647: 33647] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.977046 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} 22:52:08 executing program 3: r0 = socket(0x11, 0x3, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) D0307 22:52:08.978096 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.983125 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.983630 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.985845 340720 usertrap_amd64.go:212] [ 33646: 33646] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:08.985930 340720 usertrap_amd64.go:122] [ 33646: 33646] Allocate a new trap: 0xc0069a2cf0 43 D0307 22:52:08.986010 340720 usertrap_amd64.go:225] [ 33646: 33646] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:08.990818 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:08.991318 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:08.992143 340720 task_exit.go:204] [ 33646: 33646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.992353 340720 task_signals.go:204] [ 33646: 33651] Signal 33646, PID: 33651, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.992432 340720 task_exit.go:204] [ 33646: 33646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.992534 340720 task_exit.go:204] [ 33646: 33651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.993514 340720 usertrap_amd64.go:212] [ 33648: 33648] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:08.993577 340720 usertrap_amd64.go:122] [ 33648: 33648] Allocate a new trap: 0xc00bf785d0 43 D0307 22:52:08.993638 340720 usertrap_amd64.go:225] [ 33648: 33648] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:08.997610 340720 task_exit.go:204] [ 33646: 33651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.997696 340720 task_exit.go:204] [ 33646: 33651] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.997824 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:08.997959 340720 task_exit.go:204] [ 33646: 33646] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:08.998162 340720 task_signals.go:204] [ 33648: 33652] Signal 33648, PID: 33652, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:08.998190 340720 task_exit.go:204] [ 33648: 33648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.998329 340720 task_exit.go:204] [ 33648: 33652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:08.998802 340720 task_exit.go:204] [ 33648: 33652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:08.998855 340720 task_exit.go:204] [ 33648: 33652] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, 0x0, 0x0) D0307 22:52:09.003497 340720 task_exit.go:204] [ 33648: 33648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.003607 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:09.004405 340720 task_exit.go:204] [ 33648: 33648] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.011129 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} 22:52:09 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000021c0)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) D0307 22:52:09.011542 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.014956 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.015602 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.016249 340720 usertrap_amd64.go:212] [ 33653: 33653] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:09.016395 340720 usertrap_amd64.go:122] [ 33653: 33653] Allocate a new trap: 0xc000432d50 40 D0307 22:52:09.016973 340720 usertrap_amd64.go:225] [ 33653: 33653] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:09.024678 340720 usertrap_amd64.go:212] [ 33654: 33654] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:09.024830 340720 usertrap_amd64.go:122] [ 33654: 33654] Allocate a new trap: 0xc0011d6870 39 D0307 22:52:09.025171 340720 usertrap_amd64.go:212] [ 33653: 33653] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:09.025284 340720 usertrap_amd64.go:122] [ 33653: 33653] Allocate a new trap: 0xc000432d50 41 D0307 22:52:09.025346 340720 usertrap_amd64.go:225] [ 33653: 33653] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:09.025697 340720 usertrap_amd64.go:225] [ 33654: 33654] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:09.029024 340720 usertrap_amd64.go:212] [ 33654: 33654] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:09.029105 340720 usertrap_amd64.go:122] [ 33654: 33654] Allocate a new trap: 0xc0011d6870 40 D0307 22:52:09.029174 340720 usertrap_amd64.go:225] [ 33654: 33654] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:09.032323 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.032787 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.035769 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.036066 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.046902 340720 usertrap_amd64.go:212] [ 33653: 33653] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:09.047020 340720 usertrap_amd64.go:122] [ 33653: 33653] Allocate a new trap: 0xc000432d50 42 D0307 22:52:09.047103 340720 usertrap_amd64.go:225] [ 33653: 33653] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:09.047182 340720 usertrap_amd64.go:212] [ 33656: 33656] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:09.047287 340720 usertrap_amd64.go:122] [ 33656: 33656] Allocate a new trap: 0xc0069a2f00 40 D0307 22:52:09.048109 340720 usertrap_amd64.go:225] [ 33656: 33656] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:09.048553 340720 usertrap_amd64.go:212] [ 33655: 33655] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:09.048677 340720 usertrap_amd64.go:122] [ 33655: 33655] Allocate a new trap: 0xc00996e780 40 D0307 22:52:09.049567 340720 usertrap_amd64.go:225] [ 33655: 33655] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:09.052004 340720 usertrap_amd64.go:212] [ 33655: 33655] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:09.052093 340720 usertrap_amd64.go:122] [ 33655: 33655] Allocate a new trap: 0xc00996e780 41 D0307 22:52:09.052174 340720 usertrap_amd64.go:225] [ 33655: 33655] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:09.055591 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.056005 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.067958 340720 usertrap_amd64.go:212] [ 33656: 33656] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:09.068052 340720 usertrap_amd64.go:122] [ 33656: 33656] Allocate a new trap: 0xc0069a2f00 41 D0307 22:52:09.068131 340720 usertrap_amd64.go:225] [ 33656: 33656] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:09.068602 340720 usertrap_amd64.go:212] [ 33653: 33653] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:09.068702 340720 usertrap_amd64.go:122] [ 33653: 33653] Allocate a new trap: 0xc000432d50 43 D0307 22:52:09.068764 340720 usertrap_amd64.go:225] [ 33653: 33653] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:09.072510 340720 usertrap_amd64.go:212] [ 33655: 33655] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:09.072611 340720 usertrap_amd64.go:122] [ 33655: 33655] Allocate a new trap: 0xc00996e780 42 D0307 22:52:09.072694 340720 usertrap_amd64.go:225] [ 33655: 33655] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:09.073150 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.074384 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.075052 340720 usertrap_amd64.go:212] [ 33654: 33654] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:09.075150 340720 usertrap_amd64.go:122] [ 33654: 33654] Allocate a new trap: 0xc0011d6870 41 D0307 22:52:09.075285 340720 usertrap_amd64.go:225] [ 33654: 33654] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:09.077205 340720 task_exit.go:204] [ 33653: 33653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.077389 340720 task_signals.go:204] [ 33653: 33657] Signal 33653, PID: 33657, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.077488 340720 task_exit.go:204] [ 33653: 33657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.077815 340720 task_exit.go:204] [ 33653: 33653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.081845 340720 task_exit.go:204] [ 33653: 33657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.081911 340720 task_exit.go:204] [ 33653: 33657] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.082011 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:09.084294 340720 task_exit.go:204] [ 33653: 33653] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.086207 340720 usertrap_amd64.go:212] [ 33656: 33656] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:09.086321 340720 usertrap_amd64.go:122] [ 33656: 33656] Allocate a new trap: 0xc0069a2f00 42 D0307 22:52:09.086408 340720 usertrap_amd64.go:225] [ 33656: 33656] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) 22:52:09 executing program 3: r0 = socket(0x11, 0x3, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) D0307 22:52:09.086908 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, sys, ]} D0307 22:52:09.089042 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.095700 340720 usertrap_amd64.go:212] [ 33655: 33655] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:09.095767 340720 usertrap_amd64.go:122] [ 33655: 33655] Allocate a new trap: 0xc00996e780 43 D0307 22:52:09.095839 340720 usertrap_amd64.go:225] [ 33655: 33655] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:09.097971 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.098358 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.098574 340720 task_exit.go:204] [ 33655: 33655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.098881 340720 task_exit.go:204] [ 33655: 33655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.099192 340720 task_signals.go:204] [ 33655: 33658] Signal 33655, PID: 33658, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.099319 340720 task_exit.go:204] [ 33655: 33658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.101611 340720 usertrap_amd64.go:212] [ 33656: 33656] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:09.101687 340720 usertrap_amd64.go:122] [ 33656: 33656] Allocate a new trap: 0xc0069a2f00 43 D0307 22:52:09.101782 340720 usertrap_amd64.go:225] [ 33656: 33656] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:09.103402 340720 task_exit.go:204] [ 33655: 33658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.103479 340720 task_exit.go:204] [ 33655: 33658] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.103600 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:09.103892 340720 task_exit.go:204] [ 33655: 33655] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000021c0)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) D0307 22:52:09.105369 340720 task_exit.go:204] [ 33656: 33656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.105698 340720 task_signals.go:204] [ 33656: 33660] Signal 33656, PID: 33660, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.105799 340720 task_exit.go:204] [ 33656: 33660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.106445 340720 task_exit.go:204] [ 33656: 33656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.111221 340720 task_exit.go:204] [ 33656: 33660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.111302 340720 task_exit.go:204] [ 33656: 33660] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.111406 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:09.112055 340720 task_exit.go:204] [ 33656: 33656] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) D0307 22:52:09.118949 340720 usertrap_amd64.go:212] [ 33654: 33654] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:09.119018 340720 usertrap_amd64.go:122] [ 33654: 33654] Allocate a new trap: 0xc0011d6870 42 D0307 22:52:09.119096 340720 usertrap_amd64.go:225] [ 33654: 33654] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:09.119301 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.121819 340720 task_exit.go:204] [ 33654: 33654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.122040 340720 task_exit.go:204] [ 33654: 33654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.122042 340720 task_signals.go:204] [ 33654: 33659] Signal 33654, PID: 33659, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.122375 340720 task_exit.go:204] [ 33654: 33659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.122757 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.126627 340720 task_exit.go:204] [ 33654: 33659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.126716 340720 task_exit.go:204] [ 33654: 33659] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.126836 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:09.127125 340720 task_exit.go:204] [ 33654: 33654] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5421, &(0x7f0000000040)=ANY=[]) D0307 22:52:09.134267 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.134751 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.138945 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.139807 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.141533 340720 usertrap_amd64.go:212] [ 33661: 33661] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:09.141675 340720 usertrap_amd64.go:122] [ 33661: 33661] Allocate a new trap: 0xc00996e900 40 D0307 22:52:09.142275 340720 usertrap_amd64.go:225] [ 33661: 33661] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:09.144618 340720 usertrap_amd64.go:212] [ 33661: 33661] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:09.144726 340720 usertrap_amd64.go:122] [ 33661: 33661] Allocate a new trap: 0xc00996e900 41 D0307 22:52:09.144792 340720 usertrap_amd64.go:225] [ 33661: 33661] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:09.146816 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.147181 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.152128 340720 usertrap_amd64.go:212] [ 33662: 33662] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:09.152253 340720 usertrap_amd64.go:122] [ 33662: 33662] Allocate a new trap: 0xc00bf78720 40 D0307 22:52:09.152713 340720 usertrap_amd64.go:225] [ 33662: 33662] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:09.155986 340720 usertrap_amd64.go:212] [ 33662: 33662] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:09.156046 340720 usertrap_amd64.go:122] [ 33662: 33662] Allocate a new trap: 0xc00bf78720 41 D0307 22:52:09.156128 340720 usertrap_amd64.go:225] [ 33662: 33662] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:09.175778 340720 usertrap_amd64.go:212] [ 33661: 33661] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:09.175881 340720 usertrap_amd64.go:122] [ 33661: 33661] Allocate a new trap: 0xc00996e900 42 D0307 22:52:09.175964 340720 usertrap_amd64.go:225] [ 33661: 33661] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:09.177780 340720 usertrap_amd64.go:212] [ 33663: 33663] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:09.177902 340720 usertrap_amd64.go:122] [ 33663: 33663] Allocate a new trap: 0xc0046366f0 39 D0307 22:52:09.178535 340720 usertrap_amd64.go:225] [ 33663: 33663] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:09.179149 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.179590 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.184759 340720 usertrap_amd64.go:212] [ 33663: 33663] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:09.184884 340720 usertrap_amd64.go:122] [ 33663: 33663] Allocate a new trap: 0xc0046366f0 40 D0307 22:52:09.185049 340720 usertrap_amd64.go:225] [ 33663: 33663] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:09.188848 340720 usertrap_amd64.go:212] [ 33664: 33664] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:09.189062 340720 usertrap_amd64.go:122] [ 33664: 33664] Allocate a new trap: 0xc00636c7e0 40 D0307 22:52:09.189572 340720 usertrap_amd64.go:225] [ 33664: 33664] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:09.189743 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.192848 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.198764 340720 usertrap_amd64.go:212] [ 33661: 33661] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:09.198823 340720 usertrap_amd64.go:122] [ 33661: 33661] Allocate a new trap: 0xc00996e900 43 D0307 22:52:09.198892 340720 usertrap_amd64.go:225] [ 33661: 33661] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:09.202355 340720 task_exit.go:204] [ 33661: 33661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.202580 340720 task_signals.go:204] [ 33661: 33665] Signal 33661, PID: 33665, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.202636 340720 task_exit.go:204] [ 33661: 33661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.202768 340720 task_exit.go:204] [ 33661: 33665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.206397 340720 task_exit.go:204] [ 33661: 33665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.206461 340720 task_exit.go:204] [ 33661: 33665] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.206586 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:09.206682 340720 usertrap_amd64.go:212] [ 33663: 33663] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:09.206735 340720 usertrap_amd64.go:122] [ 33663: 33663] Allocate a new trap: 0xc0046366f0 41 D0307 22:52:09.206803 340720 usertrap_amd64.go:225] [ 33663: 33663] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:09.207252 340720 task_exit.go:204] [ 33661: 33661] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 3: r0 = socket(0x11, 0x3, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) D0307 22:52:09.213314 340720 usertrap_amd64.go:212] [ 33664: 33664] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:09.213435 340720 usertrap_amd64.go:122] [ 33664: 33664] Allocate a new trap: 0xc00636c7e0 41 D0307 22:52:09.213535 340720 usertrap_amd64.go:225] [ 33664: 33664] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:09.216083 340720 usertrap_amd64.go:212] [ 33662: 33662] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:09.216165 340720 usertrap_amd64.go:122] [ 33662: 33662] Allocate a new trap: 0xc00bf78720 42 D0307 22:52:09.216225 340720 usertrap_amd64.go:225] [ 33662: 33662] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:09.216725 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.218735 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.221992 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.223596 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.235681 340720 usertrap_amd64.go:212] [ 33663: 33663] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:09.235793 340720 usertrap_amd64.go:122] [ 33663: 33663] Allocate a new trap: 0xc0046366f0 42 D0307 22:52:09.235883 340720 usertrap_amd64.go:225] [ 33663: 33663] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:09.237913 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, sys, ]} D0307 22:52:09.239548 340720 task_exit.go:204] [ 33663: 33663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.239866 340720 task_exit.go:204] [ 33663: 33663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.239864 340720 task_signals.go:204] [ 33663: 33666] Signal 33663, PID: 33666, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.239976 340720 task_exit.go:204] [ 33663: 33666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.241034 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.243874 340720 usertrap_amd64.go:212] [ 33662: 33662] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:09.243951 340720 usertrap_amd64.go:122] [ 33662: 33662] Allocate a new trap: 0xc00bf78720 43 D0307 22:52:09.244048 340720 usertrap_amd64.go:225] [ 33662: 33662] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:09.244049 340720 task_exit.go:204] [ 33663: 33666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.244122 340720 task_exit.go:204] [ 33663: 33666] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.244241 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:09.246192 340720 task_exit.go:204] [ 33663: 33663] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 2: setpgid(0x0, 0x0) getgid() semctl$GETNCNT(0xffffffffffffffff, 0x7, 0x3, &(0x7f0000000100)=""/214) D0307 22:52:09.255422 340720 usertrap_amd64.go:212] [ 33664: 33664] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:09.255475 340720 usertrap_amd64.go:122] [ 33664: 33664] Allocate a new trap: 0xc00636c7e0 42 D0307 22:52:09.255562 340720 usertrap_amd64.go:225] [ 33664: 33664] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:09.263120 340720 task_exit.go:204] [ 33662: 33662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.263424 340720 task_signals.go:204] [ 33662: 33667] Signal 33662, PID: 33667, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.263558 340720 task_exit.go:204] [ 33662: 33667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.263901 340720 task_exit.go:204] [ 33662: 33662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.268411 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.268801 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.273718 340720 task_exit.go:204] [ 33662: 33667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.273800 340720 task_exit.go:204] [ 33662: 33667] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.273951 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:09.274660 340720 task_exit.go:204] [ 33662: 33662] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.277718 340720 usertrap_amd64.go:212] [ 33664: 33669] Found the pattern at ip 55776072e27d:sysno 257 D0307 22:52:09.278979 340720 usertrap_amd64.go:122] [ 33664: 33669] Allocate a new trap: 0xc00636c7e0 43 D0307 22:52:09.279068 340720 usertrap_amd64.go:225] [ 33664: 33669] Apply the binary patch addr 55776072e27d trap addr 6ad70 ([184 1 1 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:09.280714 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} 22:52:09 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000021c0)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) D0307 22:52:09.281110 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.284717 340720 task_exit.go:204] [ 33664: 33669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.284924 340720 usertrap_amd64.go:212] [ 33668: 33668] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:09.285116 340720 usertrap_amd64.go:122] [ 33668: 33668] Allocate a new trap: 0xc00996ebd0 40 D0307 22:52:09.285172 340720 task_exit.go:204] [ 33664: 33669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.285238 340720 task_exit.go:204] [ 33664: 33669] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.286261 340720 usertrap_amd64.go:225] [ 33668: 33668] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:09.286722 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.287464 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.292090 340720 usertrap_amd64.go:212] [ 33668: 33668] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:09.292322 340720 usertrap_amd64.go:122] [ 33668: 33668] Allocate a new trap: 0xc00996ebd0 41 D0307 22:52:09.292516 340720 usertrap_amd64.go:225] [ 33668: 33668] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:09.307802 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.308292 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.314061 340720 usertrap_amd64.go:212] [ 33671: 33671] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:09.314168 340720 usertrap_amd64.go:122] [ 33671: 33671] Allocate a new trap: 0xc004f82930 40 D0307 22:52:09.314783 340720 usertrap_amd64.go:225] [ 33671: 33671] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:09.320759 340720 usertrap_amd64.go:212] [ 33670: 33670] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:09.320885 340720 usertrap_amd64.go:122] [ 33670: 33670] Allocate a new trap: 0xc004f82900 39 D0307 22:52:09.321644 340720 usertrap_amd64.go:225] [ 33670: 33670] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:09.338445 340720 usertrap_amd64.go:212] [ 33671: 33671] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:09.338619 340720 usertrap_amd64.go:212] [ 33670: 33670] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:09.338785 340720 usertrap_amd64.go:122] [ 33670: 33670] Allocate a new trap: 0xc004f82900 40 D0307 22:52:09.338993 340720 usertrap_amd64.go:225] [ 33670: 33670] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:09.338640 340720 usertrap_amd64.go:122] [ 33671: 33671] Allocate a new trap: 0xc004f82930 41 D0307 22:52:09.339355 340720 usertrap_amd64.go:225] [ 33671: 33671] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:09.342121 340720 usertrap_amd64.go:212] [ 33668: 33668] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:09.342269 340720 usertrap_amd64.go:122] [ 33668: 33668] Allocate a new trap: 0xc00996ebd0 42 D0307 22:52:09.342366 340720 usertrap_amd64.go:225] [ 33668: 33668] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:09.342619 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.343155 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.349121 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.351614 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.356073 340720 usertrap_amd64.go:212] [ 33664: 33664] Found the pattern at ip 5577607a0e1a:sysno 230 D0307 22:52:09.356146 340720 usertrap_amd64.go:122] [ 33664: 33664] Allocate a new trap: 0xc00636c7e0 44 D0307 22:52:09.356265 340720 usertrap_amd64.go:225] [ 33664: 33664] Apply the binary patch addr 5577607a0e1a trap addr 6adc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0307 22:52:09.359971 340720 usertrap_amd64.go:212] [ 33668: 33668] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:09.360043 340720 usertrap_amd64.go:122] [ 33668: 33668] Allocate a new trap: 0xc00996ebd0 43 D0307 22:52:09.360103 340720 usertrap_amd64.go:225] [ 33668: 33668] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:09.361127 340720 usertrap_amd64.go:212] [ 33670: 33670] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:09.361223 340720 usertrap_amd64.go:122] [ 33670: 33670] Allocate a new trap: 0xc004f82900 41 D0307 22:52:09.361329 340720 usertrap_amd64.go:225] [ 33670: 33670] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:09.366219 340720 task_exit.go:204] [ 33668: 33668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.366435 340720 task_signals.go:204] [ 33668: 33673] Signal 33668, PID: 33673, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.366588 340720 task_exit.go:204] [ 33668: 33673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.367366 340720 task_exit.go:204] [ 33668: 33668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.370413 340720 usertrap_amd64.go:212] [ 33671: 33671] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:09.370499 340720 usertrap_amd64.go:122] [ 33671: 33671] Allocate a new trap: 0xc004f82930 42 D0307 22:52:09.370590 340720 usertrap_amd64.go:225] [ 33671: 33671] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:09.371805 340720 task_exit.go:204] [ 33668: 33673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.371985 340720 task_exit.go:204] [ 33668: 33673] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.372141 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:09.372695 340720 task_exit.go:204] [ 33668: 33668] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 3: r0 = socket(0x11, 0x3, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) D0307 22:52:09.382187 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, sys, ]} D0307 22:52:09.382693 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.384221 340720 usertrap_amd64.go:212] [ 33671: 33671] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:09.384312 340720 usertrap_amd64.go:122] [ 33671: 33671] Allocate a new trap: 0xc004f82930 43 D0307 22:52:09.384445 340720 usertrap_amd64.go:225] [ 33671: 33671] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:09.384524 340720 usertrap_amd64.go:212] [ 33670: 33670] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:09.384602 340720 usertrap_amd64.go:122] [ 33670: 33670] Allocate a new trap: 0xc004f82900 42 D0307 22:52:09.384690 340720 usertrap_amd64.go:225] [ 33670: 33670] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:09.389178 340720 task_exit.go:204] [ 33670: 33670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.389523 340720 task_signals.go:204] [ 33670: 33674] Signal 33670, PID: 33674, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.389610 340720 task_exit.go:204] [ 33670: 33670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.389775 340720 task_exit.go:204] [ 33670: 33674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.390342 340720 task_exit.go:204] [ 33671: 33671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.390750 340720 task_exit.go:204] [ 33671: 33671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.391207 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.391524 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.392370 340720 task_exit.go:204] [ 33670: 33674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.392435 340720 task_exit.go:204] [ 33670: 33674] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.392681 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:09.392859 340720 task_signals.go:204] [ 33671: 33675] Signal 33671, PID: 33675, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.392992 340720 task_exit.go:204] [ 33671: 33675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.393533 340720 task_exit.go:204] [ 33670: 33670] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.396844 340720 task_exit.go:204] [ 33671: 33675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.396929 340720 task_exit.go:204] [ 33671: 33675] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.397071 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 22:52:09 executing program 2: setpgid(0x0, 0x0) getgid() semctl$GETNCNT(0xffffffffffffffff, 0x7, 0x3, &(0x7f0000000100)=""/214) D0307 22:52:09.398080 340720 task_exit.go:204] [ 33671: 33671] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:09 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000021c0)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) D0307 22:52:09.406245 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.406704 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.415175 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.415500 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.449558 340720 usertrap_amd64.go:212] [ 33676: 33676] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:09.449709 340720 usertrap_amd64.go:122] [ 33676: 33676] Allocate a new trap: 0xc0069a3200 40 D0307 22:52:09.450163 340720 usertrap_amd64.go:212] [ 33678: 33678] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:09.450306 340720 usertrap_amd64.go:122] [ 33678: 33678] Allocate a new trap: 0xc00bf78a20 39 D0307 22:52:09.450339 340720 usertrap_amd64.go:225] [ 33676: 33676] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:09.450418 340720 usertrap_amd64.go:212] [ 33677: 33677] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:09.450515 340720 usertrap_amd64.go:122] [ 33677: 33677] Allocate a new trap: 0xc00bf789f0 40 D0307 22:52:09.451073 340720 usertrap_amd64.go:225] [ 33677: 33677] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:09.451042 340720 usertrap_amd64.go:225] [ 33678: 33678] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:09.454373 340720 usertrap_amd64.go:212] [ 33678: 33678] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:09.454431 340720 usertrap_amd64.go:122] [ 33678: 33678] Allocate a new trap: 0xc00bf78a20 40 D0307 22:52:09.454497 340720 usertrap_amd64.go:225] [ 33678: 33678] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:09.454759 340720 usertrap_amd64.go:212] [ 33677: 33677] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:09.454829 340720 usertrap_amd64.go:122] [ 33677: 33677] Allocate a new trap: 0xc00bf789f0 41 D0307 22:52:09.454917 340720 usertrap_amd64.go:225] [ 33677: 33677] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:09.457221 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.457557 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.457869 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.458185 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.463678 340720 usertrap_amd64.go:212] [ 33676: 33676] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:09.463797 340720 usertrap_amd64.go:122] [ 33676: 33676] Allocate a new trap: 0xc0069a3200 41 D0307 22:52:09.463870 340720 usertrap_amd64.go:225] [ 33676: 33676] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:09.466586 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:09.467063 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.480561 340720 usertrap_amd64.go:212] [ 33676: 33676] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:09.480747 340720 usertrap_amd64.go:122] [ 33676: 33676] Allocate a new trap: 0xc0069a3200 42 D0307 22:52:09.480843 340720 usertrap_amd64.go:225] [ 33676: 33676] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:09.484035 340720 usertrap_amd64.go:212] [ 33678: 33678] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:09.484347 340720 usertrap_amd64.go:212] [ 33677: 33677] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:09.484327 340720 usertrap_amd64.go:122] [ 33678: 33678] Allocate a new trap: 0xc00bf78a20 41 D0307 22:52:09.484437 340720 usertrap_amd64.go:122] [ 33677: 33677] Allocate a new trap: 0xc00bf789f0 42 D0307 22:52:09.484569 340720 usertrap_amd64.go:225] [ 33678: 33678] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:09.484602 340720 usertrap_amd64.go:225] [ 33677: 33677] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:09.496153 340720 usertrap_amd64.go:212] [ 33676: 33676] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:09.496215 340720 usertrap_amd64.go:122] [ 33676: 33676] Allocate a new trap: 0xc0069a3200 43 D0307 22:52:09.496347 340720 usertrap_amd64.go:225] [ 33676: 33676] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:09.507471 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, sys, ]} D0307 22:52:09.507933 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.510000 340720 usertrap_amd64.go:212] [ 33677: 33677] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:09.510172 340720 usertrap_amd64.go:122] [ 33677: 33677] Allocate a new trap: 0xc00bf789f0 43 D0307 22:52:09.510294 340720 usertrap_amd64.go:225] [ 33677: 33677] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:09.512077 340720 usertrap_amd64.go:212] [ 33678: 33678] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:09.512171 340720 usertrap_amd64.go:122] [ 33678: 33678] Allocate a new trap: 0xc00bf78a20 42 D0307 22:52:09.512259 340720 usertrap_amd64.go:225] [ 33678: 33678] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:09.514012 340720 task_exit.go:204] [ 33676: 33676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.514325 340720 task_exit.go:204] [ 33676: 33676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.514543 340720 task_signals.go:204] [ 33676: 33679] Signal 33676, PID: 33679, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.514694 340720 task_exit.go:204] [ 33676: 33679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.517317 340720 task_exit.go:204] [ 33677: 33677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.517745 340720 task_signals.go:204] [ 33677: 33680] Signal 33677, PID: 33680, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.520050 340720 task_exit.go:204] [ 33677: 33680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.520361 340720 task_signals.go:204] [ 33678: 33681] Signal 33678, PID: 33681, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:09.520583 340720 task_exit.go:204] [ 33677: 33677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.520751 340720 task_exit.go:204] [ 33676: 33679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.521261 340720 task_exit.go:204] [ 33676: 33679] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.521485 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:09.521663 340720 task_exit.go:204] [ 33678: 33678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.521847 340720 task_exit.go:204] [ 33678: 33678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.522191 340720 task_exit.go:204] [ 33676: 33676] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.522422 340720 task_exit.go:204] [ 33678: 33681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:09.525361 340720 task_exit.go:204] [ 33677: 33680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.525485 340720 task_exit.go:204] [ 33677: 33680] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.525791 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:09.526357 340720 task_exit.go:204] [ 33677: 33677] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.529776 340720 task_exit.go:204] [ 33678: 33681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:09.529880 340720 task_exit.go:204] [ 33678: 33681] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.530017 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:09.530701 340720 task_exit.go:204] [ 33678: 33678] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:09.535478 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.536720 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.537826 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.538167 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:09.544153 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:09.545004 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.064694 340720 usertrap_amd64.go:212] [ 33664: 33664] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:10.064783 340720 usertrap_amd64.go:122] [ 33664: 33664] Allocate a new trap: 0xc00636c7e0 45 D0307 22:52:10.064845 340720 usertrap_amd64.go:225] [ 33664: 33664] Apply the binary patch addr 55776072dfa4 trap addr 6ae10 ([184 3 0 0 0 15 5] -> [255 36 37 16 174 6 0]) D0307 22:52:10.068818 340720 task_exit.go:204] [ 33664: 33664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.069221 340720 task_exit.go:204] [ 33664: 33664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.069386 340720 task_signals.go:204] [ 33664: 33672] Signal 33664, PID: 33672, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.069494 340720 task_exit.go:204] [ 33664: 33672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.073772 340720 task_exit.go:204] [ 33664: 33672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.073859 340720 task_exit.go:204] [ 33664: 33672] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.073959 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:10.075542 340720 task_exit.go:204] [ 33664: 33664] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) 22:52:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r2, 0x0) accept$inet(r2, 0x0, 0x0) 22:52:10 executing program 2: setpgid(0x0, 0x0) getgid() semctl$GETNCNT(0xffffffffffffffff, 0x7, 0x3, &(0x7f0000000100)=""/214) 22:52:10 executing program 0: r0 = inotify_init() r1 = dup(r0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x5451, 0x0) D0307 22:52:10.084389 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.084823 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.105300 340720 usertrap_amd64.go:212] [ 33682: 33682] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:10.105455 340720 usertrap_amd64.go:122] [ 33682: 33682] Allocate a new trap: 0xc001890f00 40 D0307 22:52:10.106027 340720 usertrap_amd64.go:225] [ 33682: 33682] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:10.114192 340720 usertrap_amd64.go:212] [ 33685: 33685] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:10.114297 340720 usertrap_amd64.go:122] [ 33685: 33685] Allocate a new trap: 0xc00bf78cf0 40 D0307 22:52:10.115388 340720 usertrap_amd64.go:225] [ 33685: 33685] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:10.118245 340720 usertrap_amd64.go:212] [ 33685: 33685] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:10.118400 340720 usertrap_amd64.go:122] [ 33685: 33685] Allocate a new trap: 0xc00bf78cf0 41 D0307 22:52:10.118510 340720 usertrap_amd64.go:225] [ 33685: 33685] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:10.121023 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.122787 340720 usertrap_amd64.go:212] [ 33682: 33682] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:10.122857 340720 usertrap_amd64.go:122] [ 33682: 33682] Allocate a new trap: 0xc001890f00 41 D0307 22:52:10.122896 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.122938 340720 usertrap_amd64.go:225] [ 33682: 33682] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:10.126094 340720 usertrap_amd64.go:212] [ 33683: 33683] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:10.126193 340720 usertrap_amd64.go:122] [ 33683: 33683] Allocate a new trap: 0xc000433140 40 D0307 22:52:10.126754 340720 usertrap_amd64.go:225] [ 33683: 33683] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:10.127139 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.127479 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.131228 340720 usertrap_amd64.go:212] [ 33683: 33683] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:10.131636 340720 usertrap_amd64.go:122] [ 33683: 33683] Allocate a new trap: 0xc000433140 41 D0307 22:52:10.131740 340720 usertrap_amd64.go:225] [ 33683: 33683] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:10.135724 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.136575 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.139018 340720 usertrap_amd64.go:212] [ 33685: 33685] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:10.139104 340720 usertrap_amd64.go:122] [ 33685: 33685] Allocate a new trap: 0xc00bf78cf0 42 D0307 22:52:10.139175 340720 usertrap_amd64.go:225] [ 33685: 33685] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:10.146471 340720 usertrap_amd64.go:212] [ 33682: 33682] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:10.146549 340720 usertrap_amd64.go:122] [ 33682: 33682] Allocate a new trap: 0xc001890f00 42 D0307 22:52:10.146640 340720 usertrap_amd64.go:225] [ 33682: 33682] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:10.149568 340720 usertrap_amd64.go:212] [ 33685: 33686] Found the pattern at ip 55776072e27d:sysno 257 D0307 22:52:10.149623 340720 usertrap_amd64.go:122] [ 33685: 33686] Allocate a new trap: 0xc00bf78cf0 43 D0307 22:52:10.149690 340720 usertrap_amd64.go:225] [ 33685: 33686] Apply the binary patch addr 55776072e27d trap addr 6ad70 ([184 1 1 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:10.150120 340720 usertrap_amd64.go:212] [ 33683: 33683] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:10.150217 340720 usertrap_amd64.go:122] [ 33683: 33683] Allocate a new trap: 0xc000433140 42 D0307 22:52:10.150294 340720 usertrap_amd64.go:225] [ 33683: 33683] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:10.150848 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.151159 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.152781 340720 usertrap_amd64.go:212] [ 33684: 33684] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:10.153457 340720 usertrap_amd64.go:122] [ 33684: 33684] Allocate a new trap: 0xc004f82d20 39 D0307 22:52:10.155564 340720 usertrap_amd64.go:225] [ 33684: 33684] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:10.162048 340720 usertrap_amd64.go:212] [ 33684: 33684] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:10.162166 340720 usertrap_amd64.go:122] [ 33684: 33684] Allocate a new trap: 0xc004f82d20 40 D0307 22:52:10.162256 340720 usertrap_amd64.go:225] [ 33684: 33684] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:10.164557 340720 usertrap_amd64.go:212] [ 33682: 33682] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:10.164652 340720 usertrap_amd64.go:122] [ 33682: 33682] Allocate a new trap: 0xc001890f00 43 D0307 22:52:10.164756 340720 usertrap_amd64.go:225] [ 33682: 33682] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:10.169257 340720 task_exit.go:204] [ 33682: 33682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.169776 340720 task_signals.go:204] [ 33682: 33687] Signal 33682, PID: 33687, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.169986 340720 task_exit.go:204] [ 33682: 33682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.170469 340720 task_exit.go:204] [ 33682: 33687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.170750 340720 task_exit.go:204] [ 33685: 33686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.171932 340720 task_exit.go:204] [ 33685: 33686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.172011 340720 task_exit.go:204] [ 33685: 33686] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.174251 340720 task_exit.go:204] [ 33682: 33687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.174313 340720 task_exit.go:204] [ 33682: 33687] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.174413 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:10.175382 340720 task_exit.go:204] [ 33682: 33682] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.382933 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.383776 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:10 executing program 0: r0 = inotify_init() r1 = dup(r0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x5451, 0x0) D0307 22:52:10.399169 340720 usertrap_amd64.go:212] [ 33685: 33685] Found the pattern at ip 5577607a0e1a:sysno 230 D0307 22:52:10.399452 340720 usertrap_amd64.go:122] [ 33685: 33685] Allocate a new trap: 0xc00bf78cf0 44 D0307 22:52:10.399474 340720 usertrap_amd64.go:212] [ 33683: 33683] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:10.399574 340720 usertrap_amd64.go:225] [ 33685: 33685] Apply the binary patch addr 5577607a0e1a trap addr 6adc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0307 22:52:10.399633 340720 usertrap_amd64.go:122] [ 33683: 33683] Allocate a new trap: 0xc000433140 43 D0307 22:52:10.400158 340720 usertrap_amd64.go:225] [ 33683: 33683] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:10.403485 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.403884 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.404995 340720 usertrap_amd64.go:212] [ 33684: 33684] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:10.405176 340720 usertrap_amd64.go:122] [ 33684: 33684] Allocate a new trap: 0xc004f82d20 41 D0307 22:52:10.405286 340720 usertrap_amd64.go:225] [ 33684: 33684] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:10.445408 340720 task_exit.go:204] [ 33683: 33683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.445633 340720 task_exit.go:204] [ 33683: 33683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.446376 340720 task_signals.go:204] [ 33683: 33688] Signal 33683, PID: 33688, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.446351 340720 task_signals.go:204] [ 33683: 33689] Signal 33683, PID: 33689, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.446524 340720 task_exit.go:204] [ 33683: 33688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.446689 340720 task_exit.go:204] [ 33683: 33689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.446918 340720 task_exit.go:204] [ 33683: 33689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.446961 340720 task_exit.go:204] [ 33683: 33689] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.450637 340720 usertrap_amd64.go:212] [ 33684: 33684] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:10.450711 340720 usertrap_amd64.go:122] [ 33684: 33684] Allocate a new trap: 0xc004f82d20 42 D0307 22:52:10.450774 340720 usertrap_amd64.go:225] [ 33684: 33684] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:10.452405 340720 task_exit.go:204] [ 33683: 33688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.452459 340720 task_exit.go:204] [ 33683: 33688] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.452597 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:10.452757 340720 usertrap_amd64.go:212] [ 33692: 33692] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:10.452887 340720 usertrap_amd64.go:122] [ 33692: 33692] Allocate a new trap: 0xc002538660 40 D0307 22:52:10.454386 340720 task_exit.go:204] [ 33683: 33683] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.460063 340720 usertrap_amd64.go:225] [ 33692: 33692] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) 22:52:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r2, 0x0) accept$inet(r2, 0x0, 0x0) D0307 22:52:10.463370 340720 task_exit.go:204] [ 33684: 33684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.463731 340720 task_exit.go:204] [ 33684: 33684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.464912 340720 usertrap_amd64.go:212] [ 33692: 33692] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:10.465039 340720 usertrap_amd64.go:122] [ 33692: 33692] Allocate a new trap: 0xc002538660 41 D0307 22:52:10.465025 340720 task_signals.go:204] [ 33684: 33691] Signal 33684, PID: 33691, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.465151 340720 usertrap_amd64.go:225] [ 33692: 33692] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:10.465216 340720 task_exit.go:204] [ 33684: 33691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.469104 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.469579 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.469659 340720 task_exit.go:204] [ 33684: 33691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.469750 340720 task_exit.go:204] [ 33684: 33691] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.470427 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:10.471067 340720 task_exit.go:204] [ 33684: 33684] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.472335 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.473314 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:10 executing program 2: setpgid(0x0, 0x0) getgid() semctl$GETNCNT(0xffffffffffffffff, 0x7, 0x3, &(0x7f0000000100)=""/214) D0307 22:52:10.480897 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.481448 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.484480 340720 usertrap_amd64.go:212] [ 33692: 33692] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:10.484583 340720 usertrap_amd64.go:122] [ 33692: 33692] Allocate a new trap: 0xc002538660 42 D0307 22:52:10.484697 340720 usertrap_amd64.go:225] [ 33692: 33692] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:10.510597 340720 usertrap_amd64.go:212] [ 33695: 33695] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:10.510740 340720 usertrap_amd64.go:122] [ 33695: 33695] Allocate a new trap: 0xc004636d20 39 D0307 22:52:10.511009 340720 usertrap_amd64.go:212] [ 33692: 33692] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:10.511070 340720 usertrap_amd64.go:122] [ 33692: 33692] Allocate a new trap: 0xc002538660 43 D0307 22:52:10.511139 340720 usertrap_amd64.go:225] [ 33692: 33692] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:10.511235 340720 usertrap_amd64.go:225] [ 33695: 33695] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:10.513287 340720 usertrap_amd64.go:212] [ 33694: 33694] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:10.513377 340720 usertrap_amd64.go:122] [ 33694: 33694] Allocate a new trap: 0xc00bf78ed0 40 D0307 22:52:10.513788 340720 usertrap_amd64.go:225] [ 33694: 33694] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:10.513853 340720 task_exit.go:204] [ 33692: 33692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.514135 340720 task_exit.go:204] [ 33692: 33692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.514312 340720 task_signals.go:204] [ 33692: 33693] Signal 33692, PID: 33693, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.514391 340720 task_exit.go:204] [ 33692: 33693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.517163 340720 task_exit.go:204] [ 33692: 33693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.517221 340720 task_exit.go:204] [ 33692: 33693] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.517340 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:10.518030 340720 usertrap_amd64.go:212] [ 33694: 33694] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:10.518082 340720 usertrap_amd64.go:122] [ 33694: 33694] Allocate a new trap: 0xc00bf78ed0 41 D0307 22:52:10.518180 340720 usertrap_amd64.go:225] [ 33694: 33694] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:10.518759 340720 task_exit.go:204] [ 33692: 33692] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:10 executing program 0: r0 = inotify_init() r1 = dup(r0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x5451, 0x0) D0307 22:52:10.519264 340720 usertrap_amd64.go:212] [ 33695: 33695] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:10.519327 340720 usertrap_amd64.go:122] [ 33695: 33695] Allocate a new trap: 0xc004636d20 40 D0307 22:52:10.519392 340720 usertrap_amd64.go:225] [ 33695: 33695] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:10.527183 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.527515 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.531318 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.531614 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.531795 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.532136 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.544198 340720 usertrap_amd64.go:212] [ 33694: 33694] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:10.544283 340720 usertrap_amd64.go:122] [ 33694: 33694] Allocate a new trap: 0xc00bf78ed0 42 D0307 22:52:10.544359 340720 usertrap_amd64.go:225] [ 33694: 33694] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:10.555245 340720 usertrap_amd64.go:212] [ 33695: 33695] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:10.555372 340720 usertrap_amd64.go:122] [ 33695: 33695] Allocate a new trap: 0xc004636d20 41 D0307 22:52:10.555449 340720 usertrap_amd64.go:225] [ 33695: 33695] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:10.575306 340720 usertrap_amd64.go:212] [ 33696: 33696] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:10.575439 340720 usertrap_amd64.go:122] [ 33696: 33696] Allocate a new trap: 0xc00996eff0 40 D0307 22:52:10.575941 340720 usertrap_amd64.go:225] [ 33696: 33696] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:10.587351 340720 usertrap_amd64.go:212] [ 33694: 33694] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:10.587460 340720 usertrap_amd64.go:122] [ 33694: 33694] Allocate a new trap: 0xc00bf78ed0 43 D0307 22:52:10.587545 340720 usertrap_amd64.go:225] [ 33694: 33694] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:10.588345 340720 usertrap_amd64.go:212] [ 33696: 33696] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:10.588496 340720 usertrap_amd64.go:122] [ 33696: 33696] Allocate a new trap: 0xc00996eff0 41 D0307 22:52:10.588591 340720 usertrap_amd64.go:225] [ 33696: 33696] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:10.595303 340720 task_exit.go:204] [ 33694: 33694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.595561 340720 task_exit.go:204] [ 33694: 33694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.595560 340720 usertrap_amd64.go:212] [ 33695: 33695] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:10.595636 340720 usertrap_amd64.go:122] [ 33695: 33695] Allocate a new trap: 0xc004636d20 42 D0307 22:52:10.595752 340720 usertrap_amd64.go:225] [ 33695: 33695] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:10.595833 340720 task_signals.go:204] [ 33694: 33697] Signal 33694, PID: 33697, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.595947 340720 task_exit.go:204] [ 33694: 33697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.606127 340720 task_exit.go:204] [ 33695: 33695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.606966 340720 task_signals.go:204] [ 33695: 33698] Signal 33695, PID: 33698, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.607064 340720 task_exit.go:204] [ 33695: 33695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.607356 340720 task_exit.go:204] [ 33695: 33698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.608159 340720 task_exit.go:204] [ 33694: 33697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.608207 340720 task_exit.go:204] [ 33694: 33697] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.608280 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:10.610652 340720 task_exit.go:204] [ 33695: 33698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.610724 340720 task_exit.go:204] [ 33695: 33698] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.610803 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:10.613142 340720 task_exit.go:204] [ 33694: 33694] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.615147 340720 task_exit.go:204] [ 33695: 33695] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.620001 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:10.620393 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.631154 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.632235 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.634174 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.634474 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.659018 340720 usertrap_amd64.go:212] [ 33696: 33696] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:10.659206 340720 usertrap_amd64.go:122] [ 33696: 33696] Allocate a new trap: 0xc00996eff0 42 D0307 22:52:10.659306 340720 usertrap_amd64.go:225] [ 33696: 33696] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:10.680741 340720 usertrap_amd64.go:212] [ 33696: 33696] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:10.680836 340720 usertrap_amd64.go:122] [ 33696: 33696] Allocate a new trap: 0xc00996eff0 43 D0307 22:52:10.680915 340720 usertrap_amd64.go:225] [ 33696: 33696] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:10.685055 340720 task_exit.go:204] [ 33696: 33696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.685320 340720 task_exit.go:204] [ 33696: 33696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.686895 340720 task_signals.go:204] [ 33696: 33699] Signal 33696, PID: 33699, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.686980 340720 task_exit.go:204] [ 33696: 33699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.690261 340720 task_exit.go:204] [ 33696: 33699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.690336 340720 task_exit.go:204] [ 33696: 33699] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.690534 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:10.691590 340720 task_exit.go:204] [ 33696: 33696] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.697930 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.698899 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:10.961895 340720 usertrap_amd64.go:212] [ 33685: 33685] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:10.961982 340720 usertrap_amd64.go:122] [ 33685: 33685] Allocate a new trap: 0xc00bf78cf0 45 D0307 22:52:10.962036 340720 usertrap_amd64.go:225] [ 33685: 33685] Apply the binary patch addr 55776072dfa4 trap addr 6ae10 ([184 3 0 0 0 15 5] -> [255 36 37 16 174 6 0]) D0307 22:52:10.964984 340720 task_exit.go:204] [ 33685: 33685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.965200 340720 task_exit.go:204] [ 33685: 33685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.966449 340720 task_signals.go:204] [ 33685: 33690] Signal 33685, PID: 33690, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:10.966542 340720 task_exit.go:204] [ 33685: 33690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:10.971908 340720 task_exit.go:204] [ 33685: 33690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:10.971972 340720 task_exit.go:204] [ 33685: 33690] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:10.972082 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:10.973776 340720 task_exit.go:204] [ 33685: 33685] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) 22:52:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r2, 0x0) accept$inet(r2, 0x0, 0x0) 22:52:10 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) 22:52:10 executing program 0: r0 = inotify_init() r1 = dup(r0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x5451, 0x0) D0307 22:52:10.991129 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:10.991553 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.051383 340720 usertrap_amd64.go:212] [ 33702: 33702] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:11.051500 340720 usertrap_amd64.go:122] [ 33702: 33702] Allocate a new trap: 0xc00bf791a0 40 D0307 22:52:11.052011 340720 usertrap_amd64.go:225] [ 33702: 33702] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:11.054324 340720 usertrap_amd64.go:212] [ 33702: 33702] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:11.054380 340720 usertrap_amd64.go:122] [ 33702: 33702] Allocate a new trap: 0xc00bf791a0 41 D0307 22:52:11.054447 340720 usertrap_amd64.go:225] [ 33702: 33702] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:11.054889 340720 usertrap_amd64.go:212] [ 33701: 33701] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:11.055029 340720 usertrap_amd64.go:122] [ 33701: 33701] Allocate a new trap: 0xc000433260 40 D0307 22:52:11.056879 340720 usertrap_amd64.go:212] [ 33700: 33700] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:11.056910 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.057009 340720 usertrap_amd64.go:122] [ 33700: 33700] Allocate a new trap: 0xc002c02c30 39 D0307 22:52:11.057284 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.057623 340720 usertrap_amd64.go:225] [ 33700: 33700] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:11.057709 340720 usertrap_amd64.go:225] [ 33701: 33701] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:11.061701 340720 usertrap_amd64.go:212] [ 33703: 33703] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:11.061814 340720 usertrap_amd64.go:122] [ 33703: 33703] Allocate a new trap: 0xc0011d6ea0 40 D0307 22:52:11.062434 340720 usertrap_amd64.go:212] [ 33700: 33700] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:11.062525 340720 usertrap_amd64.go:122] [ 33700: 33700] Allocate a new trap: 0xc002c02c30 40 D0307 22:52:11.062459 340720 usertrap_amd64.go:225] [ 33703: 33703] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:11.062622 340720 usertrap_amd64.go:225] [ 33700: 33700] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:11.064141 340720 usertrap_amd64.go:212] [ 33703: 33703] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:11.064235 340720 usertrap_amd64.go:122] [ 33703: 33703] Allocate a new trap: 0xc0011d6ea0 41 D0307 22:52:11.064300 340720 usertrap_amd64.go:225] [ 33703: 33703] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:11.069841 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.069969 340720 usertrap_amd64.go:212] [ 33701: 33701] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:11.070060 340720 usertrap_amd64.go:122] [ 33701: 33701] Allocate a new trap: 0xc000433260 41 D0307 22:52:11.070126 340720 usertrap_amd64.go:225] [ 33701: 33701] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:11.070267 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.074129 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.075429 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.075647 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.075922 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.076813 340720 usertrap_amd64.go:212] [ 33702: 33702] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:11.076877 340720 usertrap_amd64.go:122] [ 33702: 33702] Allocate a new trap: 0xc00bf791a0 42 D0307 22:52:11.076970 340720 usertrap_amd64.go:225] [ 33702: 33702] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:11.108017 340720 usertrap_amd64.go:212] [ 33701: 33701] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:11.108194 340720 usertrap_amd64.go:122] [ 33701: 33701] Allocate a new trap: 0xc000433260 42 D0307 22:52:11.108331 340720 usertrap_amd64.go:225] [ 33701: 33701] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:11.108606 340720 usertrap_amd64.go:212] [ 33700: 33700] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:11.108673 340720 usertrap_amd64.go:122] [ 33700: 33700] Allocate a new trap: 0xc002c02c30 41 D0307 22:52:11.108775 340720 usertrap_amd64.go:225] [ 33700: 33700] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:11.110107 340720 usertrap_amd64.go:212] [ 33703: 33703] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:11.110212 340720 usertrap_amd64.go:122] [ 33703: 33703] Allocate a new trap: 0xc0011d6ea0 42 D0307 22:52:11.110284 340720 usertrap_amd64.go:225] [ 33703: 33703] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:11.119056 340720 usertrap_amd64.go:212] [ 33702: 33702] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:11.119143 340720 usertrap_amd64.go:122] [ 33702: 33702] Allocate a new trap: 0xc00bf791a0 43 D0307 22:52:11.119260 340720 usertrap_amd64.go:225] [ 33702: 33702] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:11.132575 340720 usertrap_amd64.go:212] [ 33701: 33701] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:11.132674 340720 usertrap_amd64.go:122] [ 33701: 33701] Allocate a new trap: 0xc000433260 43 D0307 22:52:11.132739 340720 usertrap_amd64.go:225] [ 33701: 33701] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:11.144201 340720 task_exit.go:204] [ 33701: 33701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.144450 340720 task_signals.go:204] [ 33701: 33705] Signal 33701, PID: 33705, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.144571 340720 task_exit.go:204] [ 33701: 33701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.144802 340720 task_exit.go:204] [ 33701: 33705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.146956 340720 task_exit.go:204] [ 33702: 33702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.147256 340720 task_signals.go:204] [ 33702: 33704] Signal 33702, PID: 33704, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.147418 340720 task_exit.go:204] [ 33702: 33702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.148390 340720 task_exit.go:204] [ 33701: 33705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.148457 340720 task_exit.go:204] [ 33701: 33705] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.148650 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:11.149019 340720 task_exit.go:204] [ 33702: 33704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.149400 340720 task_exit.go:204] [ 33701: 33701] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.152204 340720 task_exit.go:204] [ 33702: 33704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.152276 340720 task_exit.go:204] [ 33702: 33704] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.152346 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:11.156433 340720 usertrap_amd64.go:212] [ 33703: 33706] Found the pattern at ip 55776072e27d:sysno 257 D0307 22:52:11.156501 340720 usertrap_amd64.go:122] [ 33703: 33706] Allocate a new trap: 0xc0011d6ea0 43 D0307 22:52:11.156571 340720 usertrap_amd64.go:225] [ 33703: 33706] Apply the binary patch addr 55776072e27d trap addr 6ad70 ([184 1 1 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:11.156509 340720 task_exit.go:204] [ 33702: 33702] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.157616 340720 usertrap_amd64.go:212] [ 33700: 33707] Found the pattern at ip 55918ee9527d:sysno 257 D0307 22:52:11.157672 340720 usertrap_amd64.go:122] [ 33700: 33707] Allocate a new trap: 0xc002c02c30 42 D0307 22:52:11.157777 340720 usertrap_amd64.go:225] [ 33700: 33707] Apply the binary patch addr 55918ee9527d trap addr 61d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:11.158925 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} 22:52:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r2, 0x0) accept$inet(r2, 0x0, 0x0) 22:52:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x5450) D0307 22:52:11.162699 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.163167 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.165326 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.166275 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.167712 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.170335 340720 task_exit.go:204] [ 33703: 33706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.170438 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.170684 340720 task_exit.go:204] [ 33703: 33706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.170784 340720 task_exit.go:204] [ 33703: 33706] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.170779 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.173862 340720 task_exit.go:204] [ 33700: 33707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.174183 340720 task_exit.go:204] [ 33700: 33707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.174296 340720 task_exit.go:204] [ 33700: 33707] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.210211 340720 usertrap_amd64.go:212] [ 33708: 33708] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:11.210323 340720 usertrap_amd64.go:122] [ 33708: 33708] Allocate a new trap: 0xc002538ae0 40 D0307 22:52:11.210857 340720 usertrap_amd64.go:225] [ 33708: 33708] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:11.218231 340720 usertrap_amd64.go:212] [ 33708: 33708] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:11.218300 340720 usertrap_amd64.go:122] [ 33708: 33708] Allocate a new trap: 0xc002538ae0 41 D0307 22:52:11.218359 340720 usertrap_amd64.go:225] [ 33708: 33708] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:11.221694 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.222095 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.227328 340720 usertrap_amd64.go:212] [ 33709: 33709] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:11.227448 340720 usertrap_amd64.go:122] [ 33709: 33709] Allocate a new trap: 0xc0018912c0 40 D0307 22:52:11.228152 340720 usertrap_amd64.go:225] [ 33709: 33709] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:11.231860 340720 usertrap_amd64.go:212] [ 33709: 33709] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:11.231923 340720 usertrap_amd64.go:122] [ 33709: 33709] Allocate a new trap: 0xc0018912c0 41 D0307 22:52:11.232002 340720 usertrap_amd64.go:225] [ 33709: 33709] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:11.234221 340720 usertrap_amd64.go:212] [ 33703: 33703] Found the pattern at ip 5577607a0e1a:sysno 230 D0307 22:52:11.234282 340720 usertrap_amd64.go:122] [ 33703: 33703] Allocate a new trap: 0xc0011d6ea0 44 D0307 22:52:11.234352 340720 usertrap_amd64.go:225] [ 33703: 33703] Apply the binary patch addr 5577607a0e1a trap addr 6adc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0307 22:52:11.235930 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.236356 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.245171 340720 usertrap_amd64.go:212] [ 33700: 33700] Found the pattern at ip 55918ef07e1a:sysno 230 D0307 22:52:11.245276 340720 usertrap_amd64.go:122] [ 33700: 33700] Allocate a new trap: 0xc002c02c30 43 D0307 22:52:11.245355 340720 usertrap_amd64.go:225] [ 33700: 33700] Apply the binary patch addr 55918ef07e1a trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0307 22:52:11.253425 340720 usertrap_amd64.go:212] [ 33709: 33709] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:11.253522 340720 usertrap_amd64.go:122] [ 33709: 33709] Allocate a new trap: 0xc0018912c0 42 D0307 22:52:11.253608 340720 usertrap_amd64.go:225] [ 33709: 33709] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:11.262070 340720 usertrap_amd64.go:212] [ 33708: 33708] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:11.262157 340720 usertrap_amd64.go:122] [ 33708: 33708] Allocate a new trap: 0xc002538ae0 42 D0307 22:52:11.262249 340720 usertrap_amd64.go:225] [ 33708: 33708] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:11.274449 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.275121 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.276833 340720 usertrap_amd64.go:212] [ 33708: 33713] Found the pattern at ip 55def6d0a27d:sysno 257 D0307 22:52:11.277177 340720 usertrap_amd64.go:122] [ 33708: 33713] Allocate a new trap: 0xc002538ae0 43 D0307 22:52:11.277422 340720 usertrap_amd64.go:225] [ 33708: 33713] Apply the binary patch addr 55def6d0a27d trap addr 69d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:11.278988 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.279367 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.285105 340720 usertrap_amd64.go:212] [ 33708: 33708] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:11.285190 340720 usertrap_amd64.go:122] [ 33708: 33708] Allocate a new trap: 0xc002538ae0 44 D0307 22:52:11.285280 340720 usertrap_amd64.go:225] [ 33708: 33708] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:11.292167 340720 task_exit.go:204] [ 33708: 33708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.292489 340720 task_exit.go:204] [ 33708: 33708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.292891 340720 task_signals.go:204] [ 33708: 33713] Signal 33708, PID: 33713, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.293050 340720 task_exit.go:204] [ 33708: 33713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.295894 340720 usertrap_amd64.go:212] [ 33709: 33709] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:11.296135 340720 usertrap_amd64.go:122] [ 33709: 33709] Allocate a new trap: 0xc0018912c0 43 D0307 22:52:11.296233 340720 usertrap_amd64.go:225] [ 33709: 33709] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:11.298335 340720 task_exit.go:204] [ 33708: 33713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.298545 340720 task_exit.go:204] [ 33708: 33713] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.298714 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:11.299524 340720 task_exit.go:204] [ 33708: 33708] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x5450) D0307 22:52:11.310422 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.310856 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.324000 340720 task_exit.go:204] [ 33709: 33709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.324353 340720 task_signals.go:204] [ 33709: 33712] Signal 33709, PID: 33712, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.324465 340720 task_exit.go:204] [ 33709: 33709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.325412 340720 task_exit.go:204] [ 33709: 33712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.331990 340720 task_exit.go:204] [ 33709: 33712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.332072 340720 task_exit.go:204] [ 33709: 33712] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.332207 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:11.333095 340720 task_exit.go:204] [ 33709: 33709] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.344440 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.345005 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) dup3(r1, r0, 0x0) accept(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x69) D0307 22:52:11.353813 340720 usertrap_amd64.go:212] [ 33714: 33714] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:11.354899 340720 usertrap_amd64.go:122] [ 33714: 33714] Allocate a new trap: 0xc003026e10 40 D0307 22:52:11.354993 340720 task_signals.go:470] [ 8: 13203] Notified of signal 23 D0307 22:52:11.355308 340720 task_signals.go:220] [ 8: 13203] Signal 23: delivering to handler D0307 22:52:11.355443 340720 usertrap_amd64.go:225] [ 33714: 33714] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:11.357788 340720 usertrap_amd64.go:212] [ 33714: 33714] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:11.357867 340720 usertrap_amd64.go:122] [ 33714: 33714] Allocate a new trap: 0xc003026e10 41 D0307 22:52:11.357998 340720 usertrap_amd64.go:225] [ 33714: 33714] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:11.360509 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.360924 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.376605 340720 usertrap_amd64.go:212] [ 33714: 33714] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:11.376709 340720 usertrap_amd64.go:122] [ 33714: 33714] Allocate a new trap: 0xc003026e10 42 D0307 22:52:11.376799 340720 usertrap_amd64.go:225] [ 33714: 33714] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:11.415951 340720 usertrap_amd64.go:212] [ 33715: 33715] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:11.416124 340720 usertrap_amd64.go:122] [ 33715: 33715] Allocate a new trap: 0xc0069a36b0 40 D0307 22:52:11.416743 340720 usertrap_amd64.go:225] [ 33715: 33715] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:11.421653 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.422086 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.424517 340720 usertrap_amd64.go:212] [ 33715: 33715] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:11.424651 340720 usertrap_amd64.go:122] [ 33715: 33715] Allocate a new trap: 0xc0069a36b0 41 D0307 22:52:11.424738 340720 usertrap_amd64.go:225] [ 33715: 33715] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:11.428713 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:11.431415 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.431802 340720 usertrap_amd64.go:212] [ 33714: 33716] Found the pattern at ip 55def6d0a27d:sysno 257 D0307 22:52:11.431882 340720 usertrap_amd64.go:122] [ 33714: 33716] Allocate a new trap: 0xc003026e10 43 D0307 22:52:11.431983 340720 usertrap_amd64.go:225] [ 33714: 33716] Apply the binary patch addr 55def6d0a27d trap addr 69d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:11.434131 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.435064 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.439020 340720 usertrap_amd64.go:212] [ 33714: 33714] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:11.439104 340720 usertrap_amd64.go:122] [ 33714: 33714] Allocate a new trap: 0xc003026e10 44 D0307 22:52:11.439168 340720 usertrap_amd64.go:225] [ 33714: 33714] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:11.445477 340720 task_exit.go:204] [ 33714: 33714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.445810 340720 task_exit.go:204] [ 33714: 33714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.445802 340720 task_signals.go:204] [ 33714: 33716] Signal 33714, PID: 33716, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.445933 340720 task_exit.go:204] [ 33714: 33716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.450205 340720 task_exit.go:204] [ 33714: 33716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.450295 340720 task_exit.go:204] [ 33714: 33716] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.450417 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:11.450969 340720 task_exit.go:204] [ 33714: 33714] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.464487 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.464890 340720 usertrap_amd64.go:212] [ 33715: 33715] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:11.465236 340720 usertrap_amd64.go:122] [ 33715: 33715] Allocate a new trap: 0xc0069a36b0 42 D0307 22:52:11.465328 340720 usertrap_amd64.go:225] [ 33715: 33715] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:11.465575 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.554227 340720 usertrap_amd64.go:212] [ 33715: 33715] Found the pattern at ip 55e7d905de1a:sysno 230 D0307 22:52:11.554330 340720 usertrap_amd64.go:122] [ 33715: 33715] Allocate a new trap: 0xc0069a36b0 43 D0307 22:52:11.554397 340720 usertrap_amd64.go:225] [ 33715: 33715] Apply the binary patch addr 55e7d905de1a trap addr 68d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:11.562770 340720 usertrap_amd64.go:212] [ 33715: 33715] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:11.562880 340720 usertrap_amd64.go:122] [ 33715: 33715] Allocate a new trap: 0xc0069a36b0 44 D0307 22:52:11.562941 340720 usertrap_amd64.go:225] [ 33715: 33715] Apply the binary patch addr 55e7d8feafa4 trap addr 68dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 141 6 0]) D0307 22:52:11.567642 340720 task_exit.go:204] [ 33715: 33715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.567952 340720 task_exit.go:204] [ 33715: 33715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.568120 340720 task_signals.go:204] [ 33715: 33717] Signal 33715, PID: 33717, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.568150 340720 task_signals.go:204] [ 33715: 33718] Signal 33715, PID: 33718, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.568246 340720 task_exit.go:204] [ 33715: 33717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.568414 340720 task_exit.go:204] [ 33715: 33717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.568468 340720 task_exit.go:204] [ 33715: 33717] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.568652 340720 task_exit.go:204] [ 33715: 33718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.572106 340720 task_exit.go:204] [ 33715: 33718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.572206 340720 task_exit.go:204] [ 33715: 33718] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.572325 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:11.572603 340720 task_exit.go:204] [ 33715: 33715] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.592116 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.593217 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.918574 340720 usertrap_amd64.go:212] [ 33703: 33703] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:11.918688 340720 usertrap_amd64.go:122] [ 33703: 33703] Allocate a new trap: 0xc0011d6ea0 45 D0307 22:52:11.918765 340720 usertrap_amd64.go:225] [ 33703: 33703] Apply the binary patch addr 55776072dfa4 trap addr 6ae10 ([184 3 0 0 0 15 5] -> [255 36 37 16 174 6 0]) D0307 22:52:11.918868 340720 usertrap_amd64.go:212] [ 33700: 33700] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:11.918915 340720 usertrap_amd64.go:122] [ 33700: 33700] Allocate a new trap: 0xc002c02c30 44 D0307 22:52:11.918968 340720 usertrap_amd64.go:225] [ 33700: 33700] Apply the binary patch addr 55918ee94fa4 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0307 22:52:11.922272 340720 task_exit.go:204] [ 33700: 33700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.922472 340720 task_signals.go:204] [ 33700: 33711] Signal 33700, PID: 33711, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.922583 340720 task_exit.go:204] [ 33700: 33711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.922797 340720 task_exit.go:204] [ 33700: 33711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.922863 340720 task_exit.go:204] [ 33700: 33711] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.926354 340720 task_exit.go:204] [ 33700: 33700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.926429 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:11.931266 340720 task_exit.go:204] [ 33703: 33703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.931493 340720 task_exit.go:204] [ 33703: 33703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.932686 340720 task_signals.go:204] [ 33703: 33710] Signal 33703, PID: 33710, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:11.932759 340720 task_exit.go:204] [ 33703: 33710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:11.937084 340720 task_exit.go:204] [ 33703: 33710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:11.937168 340720 task_exit.go:204] [ 33703: 33710] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.941549 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:11.941726 340720 task_exit.go:204] [ 33700: 33700] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:11.941918 340720 task_exit.go:204] [ 33703: 33703] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) 22:52:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x5450) 22:52:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) 22:52:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) dup3(r1, r0, 0x0) accept(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x69) D0307 22:52:11.949892 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.950366 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.964494 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:11.966236 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:11.989315 340720 usertrap_amd64.go:212] [ 33720: 33720] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:11.989463 340720 usertrap_amd64.go:122] [ 33720: 33720] Allocate a new trap: 0xc000296480 40 D0307 22:52:11.990075 340720 usertrap_amd64.go:225] [ 33720: 33720] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:11.996112 340720 usertrap_amd64.go:212] [ 33719: 33719] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:11.996269 340720 usertrap_amd64.go:122] [ 33719: 33719] Allocate a new trap: 0xc002538cc0 40 D0307 22:52:11.996733 340720 usertrap_amd64.go:225] [ 33719: 33719] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:11.996832 340720 usertrap_amd64.go:212] [ 33720: 33720] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:11.996927 340720 usertrap_amd64.go:122] [ 33720: 33720] Allocate a new trap: 0xc000296480 41 D0307 22:52:11.997050 340720 usertrap_amd64.go:225] [ 33720: 33720] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:12.001528 340720 usertrap_amd64.go:212] [ 33721: 33721] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:12.001632 340720 usertrap_amd64.go:122] [ 33721: 33721] Allocate a new trap: 0xc0069a3890 39 D0307 22:52:12.002226 340720 usertrap_amd64.go:225] [ 33721: 33721] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:12.006256 340720 usertrap_amd64.go:212] [ 33722: 33722] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:12.006370 340720 usertrap_amd64.go:122] [ 33722: 33722] Allocate a new trap: 0xc00636ce10 40 D0307 22:52:12.006709 340720 usertrap_amd64.go:212] [ 33721: 33721] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:12.006797 340720 usertrap_amd64.go:122] [ 33721: 33721] Allocate a new trap: 0xc0069a3890 40 D0307 22:52:12.006878 340720 usertrap_amd64.go:225] [ 33721: 33721] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:12.007052 340720 usertrap_amd64.go:225] [ 33722: 33722] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:12.010115 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.010565 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.014197 340720 usertrap_amd64.go:212] [ 33719: 33719] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:12.014269 340720 usertrap_amd64.go:122] [ 33719: 33719] Allocate a new trap: 0xc002538cc0 41 D0307 22:52:12.014349 340720 usertrap_amd64.go:225] [ 33719: 33719] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:12.018317 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.018913 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.022502 340720 usertrap_amd64.go:212] [ 33722: 33722] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:12.022585 340720 usertrap_amd64.go:122] [ 33722: 33722] Allocate a new trap: 0xc00636ce10 41 D0307 22:52:12.022660 340720 usertrap_amd64.go:225] [ 33722: 33722] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:12.026025 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.026712 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.027001 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.027828 340720 usertrap_amd64.go:212] [ 33720: 33720] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:12.027905 340720 usertrap_amd64.go:122] [ 33720: 33720] Allocate a new trap: 0xc000296480 42 D0307 22:52:12.027983 340720 usertrap_amd64.go:225] [ 33720: 33720] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:12.028036 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.035473 340720 usertrap_amd64.go:212] [ 33719: 33719] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:12.035555 340720 usertrap_amd64.go:122] [ 33719: 33719] Allocate a new trap: 0xc002538cc0 42 D0307 22:52:12.035644 340720 usertrap_amd64.go:225] [ 33719: 33719] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:12.038449 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.039301 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.040698 340720 usertrap_amd64.go:212] [ 33720: 33723] Found the pattern at ip 55def6d0a27d:sysno 257 D0307 22:52:12.040761 340720 usertrap_amd64.go:122] [ 33720: 33723] Allocate a new trap: 0xc000296480 43 D0307 22:52:12.040901 340720 usertrap_amd64.go:225] [ 33720: 33723] Apply the binary patch addr 55def6d0a27d trap addr 69d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:12.041984 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.042280 340720 usertrap_amd64.go:212] [ 33722: 33722] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:12.042349 340720 usertrap_amd64.go:122] [ 33722: 33722] Allocate a new trap: 0xc00636ce10 42 D0307 22:52:12.042432 340720 usertrap_amd64.go:225] [ 33722: 33722] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:12.043016 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.050897 340720 usertrap_amd64.go:212] [ 33720: 33720] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:12.051003 340720 usertrap_amd64.go:122] [ 33720: 33720] Allocate a new trap: 0xc000296480 44 D0307 22:52:12.051123 340720 usertrap_amd64.go:225] [ 33720: 33720] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:12.052316 340720 usertrap_amd64.go:212] [ 33722: 33725] Found the pattern at ip 55776072e27d:sysno 257 D0307 22:52:12.052407 340720 usertrap_amd64.go:122] [ 33722: 33725] Allocate a new trap: 0xc00636ce10 43 D0307 22:52:12.052497 340720 usertrap_amd64.go:225] [ 33722: 33725] Apply the binary patch addr 55776072e27d trap addr 6ad70 ([184 1 1 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:12.053932 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.054310 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.056196 340720 usertrap_amd64.go:212] [ 33721: 33721] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:12.056287 340720 usertrap_amd64.go:122] [ 33721: 33721] Allocate a new trap: 0xc0069a3890 41 D0307 22:52:12.056370 340720 usertrap_amd64.go:225] [ 33721: 33721] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:12.057353 340720 task_exit.go:204] [ 33720: 33720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.057569 340720 task_signals.go:204] [ 33720: 33723] Signal 33720, PID: 33723, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.057713 340720 task_exit.go:204] [ 33720: 33720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.057897 340720 task_exit.go:204] [ 33720: 33723] Transitioning from exit state TaskExitNone to TaskExitInitiated 22:52:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x5450) D0307 22:52:12.062982 340720 task_exit.go:204] [ 33720: 33723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.063053 340720 task_exit.go:204] [ 33720: 33723] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.063148 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:12.063525 340720 task_exit.go:204] [ 33720: 33720] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.070383 340720 task_exit.go:204] [ 33722: 33725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.070617 340720 task_exit.go:204] [ 33722: 33725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.070669 340720 task_exit.go:204] [ 33722: 33725] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.073763 340720 usertrap_amd64.go:212] [ 33721: 33726] Found the pattern at ip 55918ee9527d:sysno 257 D0307 22:52:12.073881 340720 usertrap_amd64.go:122] [ 33721: 33726] Allocate a new trap: 0xc0069a3890 42 D0307 22:52:12.074171 340720 usertrap_amd64.go:225] [ 33721: 33726] Apply the binary patch addr 55918ee9527d trap addr 61d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:12.075596 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.076389 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.076734 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.077158 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.086065 340720 task_exit.go:204] [ 33721: 33726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.086373 340720 task_exit.go:204] [ 33721: 33726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.086423 340720 task_exit.go:204] [ 33721: 33726] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.121241 340720 usertrap_amd64.go:212] [ 33727: 33727] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:12.121364 340720 usertrap_amd64.go:122] [ 33727: 33727] Allocate a new trap: 0xc00996f290 40 D0307 22:52:12.122249 340720 usertrap_amd64.go:225] [ 33727: 33727] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:12.128536 340720 usertrap_amd64.go:212] [ 33727: 33727] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:12.128591 340720 usertrap_amd64.go:122] [ 33727: 33727] Allocate a new trap: 0xc00996f290 41 D0307 22:52:12.128640 340720 usertrap_amd64.go:225] [ 33727: 33727] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:12.138138 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.138862 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.139191 340720 usertrap_amd64.go:212] [ 33722: 33722] Found the pattern at ip 5577607a0e1a:sysno 230 D0307 22:52:12.139271 340720 usertrap_amd64.go:122] [ 33722: 33722] Allocate a new trap: 0xc00636ce10 44 D0307 22:52:12.139338 340720 usertrap_amd64.go:225] [ 33722: 33722] Apply the binary patch addr 5577607a0e1a trap addr 6adc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0307 22:52:12.140499 340720 usertrap_amd64.go:212] [ 33719: 33719] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:12.140551 340720 usertrap_amd64.go:122] [ 33719: 33719] Allocate a new trap: 0xc002538cc0 43 D0307 22:52:12.140602 340720 usertrap_amd64.go:225] [ 33719: 33719] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:12.151194 340720 task_exit.go:204] [ 33719: 33719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.151357 340720 task_signals.go:204] [ 33719: 33724] Signal 33719, PID: 33724, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.151490 340720 task_exit.go:204] [ 33719: 33719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.151580 340720 task_signals.go:204] [ 33719: 33729] Signal 33719, PID: 33729, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.151841 340720 task_exit.go:204] [ 33719: 33729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.151976 340720 task_exit.go:204] [ 33719: 33729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.152019 340720 task_exit.go:204] [ 33719: 33729] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.152116 340720 task_exit.go:204] [ 33719: 33724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.155547 340720 task_exit.go:204] [ 33719: 33724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.155617 340720 task_exit.go:204] [ 33719: 33724] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.155983 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:12.155743 340720 usertrap_amd64.go:212] [ 33721: 33721] Found the pattern at ip 55918ef07e1a:sysno 230 D0307 22:52:12.156256 340720 usertrap_amd64.go:122] [ 33721: 33721] Allocate a new trap: 0xc0069a3890 43 D0307 22:52:12.156404 340720 usertrap_amd64.go:225] [ 33721: 33721] Apply the binary patch addr 55918ef07e1a trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0307 22:52:12.156829 340720 task_exit.go:204] [ 33719: 33719] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) dup3(r1, r0, 0x0) accept(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x69) D0307 22:52:12.171606 340720 usertrap_amd64.go:212] [ 33727: 33727] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:12.171708 340720 usertrap_amd64.go:122] [ 33727: 33727] Allocate a new trap: 0xc00996f290 42 D0307 22:52:12.171815 340720 usertrap_amd64.go:225] [ 33727: 33727] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:12.176393 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.176760 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.198146 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.198529 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.203788 340720 usertrap_amd64.go:212] [ 33727: 33731] Found the pattern at ip 55def6d0a27d:sysno 257 D0307 22:52:12.203909 340720 usertrap_amd64.go:122] [ 33727: 33731] Allocate a new trap: 0xc00996f290 43 D0307 22:52:12.204035 340720 usertrap_amd64.go:225] [ 33727: 33731] Apply the binary patch addr 55def6d0a27d trap addr 69d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:12.204763 340720 usertrap_amd64.go:212] [ 33732: 33732] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:12.204904 340720 usertrap_amd64.go:122] [ 33732: 33732] Allocate a new trap: 0xc00636d050 40 D0307 22:52:12.205948 340720 usertrap_amd64.go:225] [ 33732: 33732] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:12.207403 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.208548 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.209645 340720 usertrap_amd64.go:212] [ 33732: 33732] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:12.209719 340720 usertrap_amd64.go:122] [ 33732: 33732] Allocate a new trap: 0xc00636d050 41 D0307 22:52:12.209806 340720 usertrap_amd64.go:225] [ 33732: 33732] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:12.212460 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.212932 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.213661 340720 usertrap_amd64.go:212] [ 33727: 33727] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:12.213737 340720 usertrap_amd64.go:122] [ 33727: 33727] Allocate a new trap: 0xc00996f290 44 D0307 22:52:12.213793 340720 usertrap_amd64.go:225] [ 33727: 33727] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:12.217393 340720 task_exit.go:204] [ 33727: 33727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.217905 340720 task_signals.go:204] [ 33727: 33731] Signal 33727, PID: 33731, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.217957 340720 task_exit.go:204] [ 33727: 33727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.218234 340720 task_exit.go:204] [ 33727: 33731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.222450 340720 task_exit.go:204] [ 33727: 33731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.222690 340720 task_exit.go:204] [ 33727: 33731] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.222820 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:12.224447 340720 task_exit.go:204] [ 33727: 33727] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:12 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = dup(r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) D0307 22:52:12.230312 340720 usertrap_amd64.go:212] [ 33732: 33732] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:12.230415 340720 usertrap_amd64.go:122] [ 33732: 33732] Allocate a new trap: 0xc00636d050 42 D0307 22:52:12.230498 340720 usertrap_amd64.go:225] [ 33732: 33732] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:12.240511 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.241761 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.276750 340720 usertrap_amd64.go:212] [ 33734: 33734] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:12.276870 340720 usertrap_amd64.go:122] [ 33734: 33734] Allocate a new trap: 0xc000433650 40 D0307 22:52:12.277465 340720 usertrap_amd64.go:225] [ 33734: 33734] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:12.280171 340720 usertrap_amd64.go:212] [ 33734: 33734] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:12.280229 340720 usertrap_amd64.go:122] [ 33734: 33734] Allocate a new trap: 0xc000433650 41 D0307 22:52:12.280305 340720 usertrap_amd64.go:225] [ 33734: 33734] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:12.285636 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.286100 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.313663 340720 usertrap_amd64.go:212] [ 33732: 33732] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:12.313778 340720 usertrap_amd64.go:122] [ 33732: 33732] Allocate a new trap: 0xc00636d050 43 D0307 22:52:12.313839 340720 usertrap_amd64.go:225] [ 33732: 33732] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:12.314547 340720 usertrap_amd64.go:212] [ 33734: 33734] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:12.314928 340720 usertrap_amd64.go:122] [ 33734: 33734] Allocate a new trap: 0xc000433650 42 D0307 22:52:12.315085 340720 usertrap_amd64.go:225] [ 33734: 33734] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:12.318416 340720 task_exit.go:204] [ 33732: 33732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.318602 340720 task_signals.go:204] [ 33732: 33735] Signal 33732, PID: 33735, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.318688 340720 task_signals.go:204] [ 33732: 33733] Signal 33732, PID: 33733, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.318732 340720 task_exit.go:204] [ 33732: 33735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.318979 340720 task_exit.go:204] [ 33732: 33733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.321557 340720 task_exit.go:204] [ 33732: 33732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.321692 340720 task_exit.go:204] [ 33732: 33735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.321745 340720 task_exit.go:204] [ 33732: 33735] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.323994 340720 task_exit.go:204] [ 33732: 33733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.324101 340720 task_exit.go:204] [ 33732: 33733] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.324214 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:12.324470 340720 task_exit.go:204] [ 33732: 33732] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) dup3(r1, r0, 0x0) accept(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x69) D0307 22:52:12.340563 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.340896 340720 usertrap_amd64.go:212] [ 33734: 33734] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:12.340998 340720 usertrap_amd64.go:122] [ 33734: 33734] Allocate a new trap: 0xc000433650 43 D0307 22:52:12.341061 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.341105 340720 usertrap_amd64.go:225] [ 33734: 33734] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:12.344732 340720 task_exit.go:204] [ 33734: 33734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.344998 340720 task_exit.go:204] [ 33734: 33734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.345191 340720 task_signals.go:204] [ 33734: 33736] Signal 33734, PID: 33736, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.345315 340720 task_exit.go:204] [ 33734: 33736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.349567 340720 task_exit.go:204] [ 33734: 33736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.349635 340720 task_exit.go:204] [ 33734: 33736] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.349746 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:12.350192 340720 task_exit.go:204] [ 33734: 33734] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.361235 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.361947 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.389547 340720 usertrap_amd64.go:212] [ 33737: 33737] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:12.389658 340720 usertrap_amd64.go:122] [ 33737: 33737] Allocate a new trap: 0xc003027140 40 D0307 22:52:12.390678 340720 usertrap_amd64.go:225] [ 33737: 33737] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:12.397987 340720 usertrap_amd64.go:212] [ 33737: 33737] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:12.398470 340720 usertrap_amd64.go:122] [ 33737: 33737] Allocate a new trap: 0xc003027140 41 D0307 22:52:12.398555 340720 usertrap_amd64.go:225] [ 33737: 33737] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:12.401987 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.402748 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.425866 340720 usertrap_amd64.go:212] [ 33737: 33737] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:12.425978 340720 usertrap_amd64.go:122] [ 33737: 33737] Allocate a new trap: 0xc003027140 42 D0307 22:52:12.426052 340720 usertrap_amd64.go:225] [ 33737: 33737] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:12.523434 340720 usertrap_amd64.go:212] [ 33737: 33737] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:12.523571 340720 usertrap_amd64.go:122] [ 33737: 33737] Allocate a new trap: 0xc003027140 43 D0307 22:52:12.523688 340720 usertrap_amd64.go:225] [ 33737: 33737] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:12.529863 340720 task_exit.go:204] [ 33737: 33737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.530176 340720 task_signals.go:204] [ 33737: 33739] Signal 33737, PID: 33739, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.530205 340720 task_signals.go:204] [ 33737: 33738] Signal 33737, PID: 33738, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.530337 340720 task_exit.go:204] [ 33737: 33737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.530943 340720 task_exit.go:204] [ 33737: 33739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.531171 340720 task_exit.go:204] [ 33737: 33739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.531230 340720 task_exit.go:204] [ 33737: 33739] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.531392 340720 task_exit.go:204] [ 33737: 33738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.535375 340720 task_exit.go:204] [ 33737: 33738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.535452 340720 task_exit.go:204] [ 33737: 33738] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.535522 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:12.536114 340720 task_exit.go:204] [ 33737: 33737] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.550524 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.551209 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.870395 340720 usertrap_amd64.go:212] [ 33722: 33722] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:12.870491 340720 usertrap_amd64.go:122] [ 33722: 33722] Allocate a new trap: 0xc00636ce10 45 D0307 22:52:12.870593 340720 usertrap_amd64.go:225] [ 33722: 33722] Apply the binary patch addr 55776072dfa4 trap addr 6ae10 ([184 3 0 0 0 15 5] -> [255 36 37 16 174 6 0]) D0307 22:52:12.873964 340720 task_exit.go:204] [ 33722: 33722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.874157 340720 task_signals.go:204] [ 33722: 33728] Signal 33722, PID: 33728, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.874208 340720 task_exit.go:204] [ 33722: 33722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.874317 340720 task_exit.go:204] [ 33722: 33728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.879170 340720 task_exit.go:204] [ 33722: 33728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.879292 340720 task_exit.go:204] [ 33722: 33728] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.879371 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:12.880583 340720 task_exit.go:204] [ 33722: 33722] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.882690 340720 usertrap_amd64.go:212] [ 33721: 33721] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:12.882767 340720 usertrap_amd64.go:122] [ 33721: 33721] Allocate a new trap: 0xc0069a3890 44 D0307 22:52:12.882848 340720 usertrap_amd64.go:225] [ 33721: 33721] Apply the binary patch addr 55918ee94fa4 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) 22:52:12 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 22:52:12 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = dup(r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) D0307 22:52:12.889058 340720 task_exit.go:204] [ 33721: 33721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.889310 340720 task_signals.go:204] [ 33721: 33730] Signal 33721, PID: 33730, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.889391 340720 task_exit.go:204] [ 33721: 33730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.889469 340720 task_exit.go:204] [ 33721: 33721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.893032 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.893561 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.895920 340720 task_exit.go:204] [ 33721: 33730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.896016 340720 task_exit.go:204] [ 33721: 33730] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.896132 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:12.897269 340720 task_exit.go:204] [ 33721: 33721] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') exit(0x0) read$FUSE(r0, 0x0, 0x0) 22:52:12 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) symlink(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') D0307 22:52:12.905910 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:12.906323 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.916095 340720 usertrap_amd64.go:212] [ 33740: 33740] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:12.916230 340720 usertrap_amd64.go:122] [ 33740: 33740] Allocate a new trap: 0xc000296660 40 D0307 22:52:12.916901 340720 usertrap_amd64.go:225] [ 33740: 33740] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:12.926512 340720 usertrap_amd64.go:212] [ 33740: 33740] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:12.926593 340720 usertrap_amd64.go:122] [ 33740: 33740] Allocate a new trap: 0xc000296660 41 D0307 22:52:12.926676 340720 usertrap_amd64.go:225] [ 33740: 33740] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:12.931899 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.932496 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.947051 340720 usertrap_amd64.go:212] [ 33742: 33742] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:12.947298 340720 usertrap_amd64.go:122] [ 33742: 33742] Allocate a new trap: 0xc004637260 40 D0307 22:52:12.947563 340720 usertrap_amd64.go:212] [ 33740: 33740] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:12.947662 340720 usertrap_amd64.go:122] [ 33740: 33740] Allocate a new trap: 0xc000296660 42 D0307 22:52:12.947729 340720 usertrap_amd64.go:225] [ 33740: 33740] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:12.948312 340720 usertrap_amd64.go:225] [ 33742: 33742] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:12.953706 340720 usertrap_amd64.go:212] [ 33742: 33742] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:12.953897 340720 usertrap_amd64.go:122] [ 33742: 33742] Allocate a new trap: 0xc004637260 41 D0307 22:52:12.954011 340720 usertrap_amd64.go:225] [ 33742: 33742] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:12.955343 340720 usertrap_amd64.go:212] [ 33741: 33741] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:12.955444 340720 usertrap_amd64.go:122] [ 33741: 33741] Allocate a new trap: 0xc004637230 40 D0307 22:52:12.956023 340720 usertrap_amd64.go:225] [ 33741: 33741] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:12.960621 340720 usertrap_amd64.go:212] [ 33743: 33743] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:12.960725 340720 usertrap_amd64.go:122] [ 33743: 33743] Allocate a new trap: 0xc0004337d0 39 D0307 22:52:12.961941 340720 usertrap_amd64.go:225] [ 33743: 33743] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:12.962324 340720 usertrap_amd64.go:212] [ 33741: 33741] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:12.962398 340720 usertrap_amd64.go:122] [ 33741: 33741] Allocate a new trap: 0xc004637230 41 D0307 22:52:12.962468 340720 usertrap_amd64.go:225] [ 33741: 33741] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:12.962833 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.964652 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.966811 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.967109 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.972203 340720 usertrap_amd64.go:212] [ 33740: 33740] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:12.972277 340720 usertrap_amd64.go:122] [ 33740: 33740] Allocate a new trap: 0xc000296660 43 D0307 22:52:12.972528 340720 usertrap_amd64.go:225] [ 33740: 33740] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:12.979961 340720 task_exit.go:204] [ 33740: 33740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.980198 340720 usertrap_amd64.go:212] [ 33742: 33742] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:12.980266 340720 task_exit.go:204] [ 33740: 33740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.980286 340720 usertrap_amd64.go:122] [ 33742: 33742] Allocate a new trap: 0xc004637260 42 D0307 22:52:12.980479 340720 usertrap_amd64.go:225] [ 33742: 33742] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:12.980631 340720 task_signals.go:204] [ 33740: 33744] Signal 33740, PID: 33744, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:12.980860 340720 task_exit.go:204] [ 33740: 33744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:12.985401 340720 usertrap_amd64.go:212] [ 33743: 33743] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:12.985493 340720 usertrap_amd64.go:122] [ 33743: 33743] Allocate a new trap: 0xc0004337d0 40 D0307 22:52:12.985552 340720 usertrap_amd64.go:225] [ 33743: 33743] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:12.985880 340720 task_exit.go:204] [ 33740: 33744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:12.985948 340720 task_exit.go:204] [ 33740: 33744] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.986121 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:12.986926 340720 task_exit.go:204] [ 33740: 33740] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:12.989058 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:12.989476 340720 usertrap_amd64.go:212] [ 33741: 33741] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:12.989484 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:12.989534 340720 usertrap_amd64.go:122] [ 33741: 33741] Allocate a new trap: 0xc004637230 42 D0307 22:52:12.989598 340720 usertrap_amd64.go:225] [ 33741: 33741] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) 22:52:12 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) D0307 22:52:13.001577 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.003437 340720 usertrap_amd64.go:212] [ 33743: 33743] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:13.003729 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.003694 340720 usertrap_amd64.go:122] [ 33743: 33743] Allocate a new trap: 0xc0004337d0 41 D0307 22:52:13.003933 340720 usertrap_amd64.go:225] [ 33743: 33743] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:13.009432 340720 usertrap_amd64.go:212] [ 33741: 33741] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:13.009511 340720 usertrap_amd64.go:122] [ 33741: 33741] Allocate a new trap: 0xc004637230 43 D0307 22:52:13.009588 340720 usertrap_amd64.go:225] [ 33741: 33741] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:13.013733 340720 task_exit.go:204] [ 33741: 33741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.013876 340720 task_signals.go:204] [ 33741: 33746] Signal 33741, PID: 33746, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.013973 340720 task_exit.go:204] [ 33741: 33741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.014288 340720 task_exit.go:204] [ 33741: 33746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.019481 340720 usertrap_amd64.go:212] [ 33743: 33747] Found the pattern at ip 55918ee9527d:sysno 257 D0307 22:52:13.019561 340720 usertrap_amd64.go:122] [ 33743: 33747] Allocate a new trap: 0xc0004337d0 42 D0307 22:52:13.019638 340720 usertrap_amd64.go:225] [ 33743: 33747] Apply the binary patch addr 55918ee9527d trap addr 61d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:13.021230 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.021706 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.026543 340720 task_exit.go:204] [ 33741: 33746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.026663 340720 task_exit.go:204] [ 33741: 33746] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.026783 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:13.027355 340720 task_exit.go:204] [ 33741: 33741] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:13 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = dup(r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) D0307 22:52:13.029352 340720 usertrap_amd64.go:212] [ 33742: 33742] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:13.029469 340720 usertrap_amd64.go:122] [ 33742: 33742] Allocate a new trap: 0xc004637260 43 D0307 22:52:13.029570 340720 usertrap_amd64.go:225] [ 33742: 33742] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:13.033371 340720 task_exit.go:204] [ 33742: 33742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.033880 340720 task_signals.go:204] [ 33742: 33745] Signal 33742, PID: 33745, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.033914 340720 task_exit.go:204] [ 33742: 33742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.034001 340720 task_exit.go:204] [ 33742: 33745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.035188 340720 task_exit.go:204] [ 33743: 33747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.036062 340720 task_exit.go:204] [ 33743: 33747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.036190 340720 task_exit.go:204] [ 33743: 33747] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.039173 340720 task_exit.go:204] [ 33742: 33745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.039248 340720 task_exit.go:204] [ 33742: 33745] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.039344 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:13.040232 340720 task_exit.go:204] [ 33742: 33742] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) symlink(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') D0307 22:52:13.043725 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.044109 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.046950 340720 usertrap_amd64.go:212] [ 33748: 33748] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:13.047059 340720 usertrap_amd64.go:122] [ 33748: 33748] Allocate a new trap: 0xc0011d7590 40 D0307 22:52:13.047573 340720 usertrap_amd64.go:225] [ 33748: 33748] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:13.053402 340720 usertrap_amd64.go:212] [ 33748: 33748] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:13.053526 340720 usertrap_amd64.go:122] [ 33748: 33748] Allocate a new trap: 0xc0011d7590 41 D0307 22:52:13.053603 340720 usertrap_amd64.go:225] [ 33748: 33748] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:13.055606 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.055962 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.062295 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.062969 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.079719 340720 usertrap_amd64.go:212] [ 33749: 33749] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:13.079865 340720 usertrap_amd64.go:122] [ 33749: 33749] Allocate a new trap: 0xc002539140 40 D0307 22:52:13.080680 340720 usertrap_amd64.go:225] [ 33749: 33749] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:13.086595 340720 usertrap_amd64.go:212] [ 33749: 33749] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:13.086670 340720 usertrap_amd64.go:122] [ 33749: 33749] Allocate a new trap: 0xc002539140 41 D0307 22:52:13.086737 340720 usertrap_amd64.go:225] [ 33749: 33749] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:13.099450 340720 usertrap_amd64.go:212] [ 33748: 33748] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:13.099690 340720 usertrap_amd64.go:122] [ 33748: 33748] Allocate a new trap: 0xc0011d7590 42 D0307 22:52:13.099815 340720 usertrap_amd64.go:225] [ 33748: 33748] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:13.103040 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.103482 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.105511 340720 usertrap_amd64.go:212] [ 33750: 33750] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:13.105625 340720 usertrap_amd64.go:122] [ 33750: 33750] Allocate a new trap: 0xc0018918f0 40 D0307 22:52:13.107642 340720 usertrap_amd64.go:225] [ 33750: 33750] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:13.111364 340720 usertrap_amd64.go:212] [ 33750: 33750] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:13.111498 340720 usertrap_amd64.go:122] [ 33750: 33750] Allocate a new trap: 0xc0018918f0 41 D0307 22:52:13.111577 340720 usertrap_amd64.go:225] [ 33750: 33750] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:13.116193 340720 usertrap_amd64.go:212] [ 33748: 33748] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:13.116257 340720 usertrap_amd64.go:122] [ 33748: 33748] Allocate a new trap: 0xc0011d7590 43 D0307 22:52:13.116366 340720 usertrap_amd64.go:225] [ 33748: 33748] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:13.120441 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.121297 340720 usertrap_amd64.go:212] [ 33743: 33743] Found the pattern at ip 55918ef07e1a:sysno 230 D0307 22:52:13.121392 340720 usertrap_amd64.go:122] [ 33743: 33743] Allocate a new trap: 0xc0004337d0 43 D0307 22:52:13.121476 340720 usertrap_amd64.go:225] [ 33743: 33743] Apply the binary patch addr 55918ef07e1a trap addr 61d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0307 22:52:13.123056 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.127566 340720 task_exit.go:204] [ 33748: 33748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.127973 340720 task_exit.go:204] [ 33748: 33748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.127853 340720 task_signals.go:204] [ 33748: 33751] Signal 33748, PID: 33751, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.128330 340720 task_exit.go:204] [ 33748: 33751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.134427 340720 task_exit.go:204] [ 33748: 33751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.134652 340720 task_exit.go:204] [ 33748: 33751] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.134914 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:13.136630 340720 task_exit.go:204] [ 33748: 33748] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:13 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) D0307 22:52:13.139669 340720 usertrap_amd64.go:212] [ 33749: 33749] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:13.139783 340720 usertrap_amd64.go:122] [ 33749: 33749] Allocate a new trap: 0xc002539140 42 D0307 22:52:13.139891 340720 usertrap_amd64.go:225] [ 33749: 33749] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:13.146582 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.147190 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.147430 340720 usertrap_amd64.go:212] [ 33750: 33750] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:13.147495 340720 usertrap_amd64.go:122] [ 33750: 33750] Allocate a new trap: 0xc0018918f0 42 D0307 22:52:13.147595 340720 usertrap_amd64.go:225] [ 33750: 33750] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:13.172210 340720 usertrap_amd64.go:212] [ 33749: 33749] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:13.172300 340720 usertrap_amd64.go:122] [ 33749: 33749] Allocate a new trap: 0xc002539140 43 D0307 22:52:13.172361 340720 usertrap_amd64.go:225] [ 33749: 33749] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:13.188231 340720 task_signals.go:204] [ 33749: 33753] Signal 33749, PID: 33753, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.188393 340720 task_exit.go:204] [ 33749: 33753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.188917 340720 task_exit.go:204] [ 33749: 33749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.189090 340720 task_exit.go:204] [ 33749: 33753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.189155 340720 task_exit.go:204] [ 33749: 33753] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.189726 340720 usertrap_amd64.go:212] [ 33755: 33755] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:13.189906 340720 usertrap_amd64.go:122] [ 33755: 33755] Allocate a new trap: 0xc000296990 40 D0307 22:52:13.190852 340720 usertrap_amd64.go:225] [ 33755: 33755] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:13.194448 340720 task_exit.go:204] [ 33749: 33749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.194713 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:13.195015 340720 task_exit.go:204] [ 33749: 33749] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:13 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = dup(r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) D0307 22:52:13.196564 340720 usertrap_amd64.go:212] [ 33750: 33750] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:13.196659 340720 usertrap_amd64.go:122] [ 33750: 33750] Allocate a new trap: 0xc0018918f0 43 D0307 22:52:13.196721 340720 usertrap_amd64.go:225] [ 33750: 33750] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:13.197329 340720 usertrap_amd64.go:212] [ 33755: 33755] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:13.197410 340720 usertrap_amd64.go:122] [ 33755: 33755] Allocate a new trap: 0xc000296990 41 D0307 22:52:13.197497 340720 usertrap_amd64.go:225] [ 33755: 33755] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:13.199889 340720 task_exit.go:204] [ 33750: 33750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.200276 340720 task_exit.go:204] [ 33750: 33750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.200864 340720 task_signals.go:204] [ 33750: 33754] Signal 33750, PID: 33754, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.200979 340720 task_exit.go:204] [ 33750: 33754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.204758 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.205405 340720 task_exit.go:204] [ 33750: 33754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.205684 340720 task_exit.go:204] [ 33750: 33754] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.206207 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:13.206565 340720 task_exit.go:204] [ 33750: 33750] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.205751 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.208527 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.209403 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) symlink(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') D0307 22:52:13.224211 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.226904 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.229498 340720 usertrap_amd64.go:212] [ 33755: 33755] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:13.229632 340720 usertrap_amd64.go:122] [ 33755: 33755] Allocate a new trap: 0xc000296990 42 D0307 22:52:13.229713 340720 usertrap_amd64.go:225] [ 33755: 33755] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:13.255188 340720 usertrap_amd64.go:212] [ 33756: 33756] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:13.255346 340720 usertrap_amd64.go:122] [ 33756: 33756] Allocate a new trap: 0xc0030276b0 40 D0307 22:52:13.256012 340720 usertrap_amd64.go:225] [ 33756: 33756] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:13.257723 340720 usertrap_amd64.go:212] [ 33755: 33755] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:13.257817 340720 usertrap_amd64.go:122] [ 33755: 33755] Allocate a new trap: 0xc000296990 43 D0307 22:52:13.257922 340720 usertrap_amd64.go:225] [ 33755: 33755] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:13.258840 340720 usertrap_amd64.go:212] [ 33756: 33756] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:13.258935 340720 usertrap_amd64.go:122] [ 33756: 33756] Allocate a new trap: 0xc0030276b0 41 D0307 22:52:13.259029 340720 usertrap_amd64.go:225] [ 33756: 33756] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:13.259999 340720 usertrap_amd64.go:212] [ 33757: 33757] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:13.260130 340720 usertrap_amd64.go:122] [ 33757: 33757] Allocate a new trap: 0xc00636d3b0 40 D0307 22:52:13.260758 340720 usertrap_amd64.go:225] [ 33757: 33757] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:13.261380 340720 task_exit.go:204] [ 33755: 33755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.261696 340720 task_exit.go:204] [ 33755: 33755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.261943 340720 task_signals.go:204] [ 33755: 33758] Signal 33755, PID: 33758, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.262095 340720 task_exit.go:204] [ 33755: 33758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.264065 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.264653 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.266084 340720 task_exit.go:204] [ 33755: 33758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.266230 340720 task_exit.go:204] [ 33755: 33758] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.266367 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:13.267320 340720 task_exit.go:204] [ 33755: 33755] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.271563 340720 usertrap_amd64.go:212] [ 33757: 33757] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:13.271660 340720 usertrap_amd64.go:122] [ 33757: 33757] Allocate a new trap: 0xc00636d3b0 41 D0307 22:52:13.271813 340720 usertrap_amd64.go:225] [ 33757: 33757] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:13.280740 340720 usertrap_amd64.go:212] [ 33756: 33756] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:13.280845 340720 usertrap_amd64.go:122] [ 33756: 33756] Allocate a new trap: 0xc0030276b0 42 D0307 22:52:13.280922 340720 usertrap_amd64.go:225] [ 33756: 33756] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:13.282798 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.283436 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.290731 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.291089 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.313538 340720 usertrap_amd64.go:212] [ 33756: 33756] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:13.313655 340720 usertrap_amd64.go:122] [ 33756: 33756] Allocate a new trap: 0xc0030276b0 43 D0307 22:52:13.313715 340720 usertrap_amd64.go:225] [ 33756: 33756] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:13.313767 340720 usertrap_amd64.go:212] [ 33757: 33757] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:13.313839 340720 usertrap_amd64.go:122] [ 33757: 33757] Allocate a new trap: 0xc00636d3b0 42 D0307 22:52:13.313909 340720 usertrap_amd64.go:225] [ 33757: 33757] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:13.317574 340720 task_exit.go:204] [ 33756: 33756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.317795 340720 task_signals.go:204] [ 33756: 33759] Signal 33756, PID: 33759, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.317914 340720 task_exit.go:204] [ 33756: 33756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.318088 340720 task_exit.go:204] [ 33756: 33759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.324066 340720 task_exit.go:204] [ 33756: 33759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.324162 340720 task_exit.go:204] [ 33756: 33759] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.324662 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:13.325010 340720 task_exit.go:204] [ 33756: 33756] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.341163 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.341696 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.347489 340720 usertrap_amd64.go:212] [ 33757: 33757] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:13.347812 340720 usertrap_amd64.go:122] [ 33757: 33757] Allocate a new trap: 0xc00636d3b0 43 D0307 22:52:13.347947 340720 usertrap_amd64.go:225] [ 33757: 33757] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:13.360817 340720 task_exit.go:204] [ 33757: 33757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.361403 340720 task_exit.go:204] [ 33757: 33757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.361413 340720 task_signals.go:204] [ 33757: 33760] Signal 33757, PID: 33760, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.362253 340720 task_exit.go:204] [ 33757: 33760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.366618 340720 task_exit.go:204] [ 33757: 33760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.366675 340720 task_exit.go:204] [ 33757: 33760] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.367782 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:13.368038 340720 task_exit.go:204] [ 33757: 33757] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.398397 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.399259 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.831345 340720 usertrap_amd64.go:212] [ 33743: 33743] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:13.831452 340720 usertrap_amd64.go:122] [ 33743: 33743] Allocate a new trap: 0xc0004337d0 44 D0307 22:52:13.831538 340720 usertrap_amd64.go:225] [ 33743: 33743] Apply the binary patch addr 55918ee94fa4 trap addr 61dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 29 6 0]) D0307 22:52:13.837278 340720 task_exit.go:204] [ 33743: 33743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.837558 340720 task_exit.go:204] [ 33743: 33743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.838236 340720 task_signals.go:204] [ 33743: 33752] Signal 33743, PID: 33752, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.838423 340720 task_exit.go:204] [ 33743: 33752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.842982 340720 task_exit.go:204] [ 33743: 33752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.843082 340720 task_exit.go:204] [ 33743: 33752] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.843210 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:13.843369 340720 task_exit.go:204] [ 33743: 33743] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) symlink(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') 22:52:13 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 22:52:13 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') 22:52:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x5451, 0x0) D0307 22:52:13.857335 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.857751 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.891032 340720 usertrap_amd64.go:212] [ 33763: 33763] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:13.891169 340720 usertrap_amd64.go:122] [ 33763: 33763] Allocate a new trap: 0xc0069a3dd0 40 D0307 22:52:13.891156 340720 usertrap_amd64.go:212] [ 33761: 33761] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:13.891320 340720 usertrap_amd64.go:122] [ 33761: 33761] Allocate a new trap: 0xc00bf797a0 40 D0307 22:52:13.891805 340720 usertrap_amd64.go:225] [ 33763: 33763] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:13.891944 340720 usertrap_amd64.go:225] [ 33761: 33761] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:13.894621 340720 usertrap_amd64.go:212] [ 33763: 33763] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:13.894759 340720 usertrap_amd64.go:122] [ 33763: 33763] Allocate a new trap: 0xc0069a3dd0 41 D0307 22:52:13.895221 340720 usertrap_amd64.go:225] [ 33763: 33763] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:13.897299 340720 usertrap_amd64.go:212] [ 33762: 33762] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:13.897458 340720 usertrap_amd64.go:122] [ 33762: 33762] Allocate a new trap: 0xc00275d860 40 D0307 22:52:13.897961 340720 usertrap_amd64.go:225] [ 33762: 33762] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:13.898672 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.899265 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.899743 340720 usertrap_amd64.go:212] [ 33761: 33761] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:13.899800 340720 usertrap_amd64.go:122] [ 33761: 33761] Allocate a new trap: 0xc00bf797a0 41 D0307 22:52:13.899855 340720 usertrap_amd64.go:225] [ 33761: 33761] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:13.902259 340720 usertrap_amd64.go:212] [ 33762: 33762] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:13.902401 340720 usertrap_amd64.go:122] [ 33762: 33762] Allocate a new trap: 0xc00275d860 41 D0307 22:52:13.902489 340720 usertrap_amd64.go:225] [ 33762: 33762] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:13.904035 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.904409 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.909226 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.909715 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.910501 340720 usertrap_amd64.go:212] [ 33764: 33764] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:13.910602 340720 usertrap_amd64.go:122] [ 33764: 33764] Allocate a new trap: 0xc00bf797d0 39 D0307 22:52:13.911164 340720 usertrap_amd64.go:225] [ 33764: 33764] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:13.917123 340720 usertrap_amd64.go:212] [ 33761: 33761] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:13.917248 340720 usertrap_amd64.go:122] [ 33761: 33761] Allocate a new trap: 0xc00bf797a0 42 D0307 22:52:13.917331 340720 usertrap_amd64.go:225] [ 33761: 33761] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:13.919293 340720 usertrap_amd64.go:212] [ 33764: 33764] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:13.919385 340720 usertrap_amd64.go:122] [ 33764: 33764] Allocate a new trap: 0xc00bf797d0 40 D0307 22:52:13.919444 340720 usertrap_amd64.go:225] [ 33764: 33764] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:13.923218 340720 usertrap_amd64.go:212] [ 33763: 33763] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:13.923319 340720 usertrap_amd64.go:122] [ 33763: 33763] Allocate a new trap: 0xc0069a3dd0 42 D0307 22:52:13.923376 340720 usertrap_amd64.go:225] [ 33763: 33763] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:13.923558 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:13.924196 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.927657 340720 usertrap_amd64.go:212] [ 33762: 33762] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:13.927718 340720 usertrap_amd64.go:122] [ 33762: 33762] Allocate a new trap: 0xc00275d860 42 D0307 22:52:13.927770 340720 usertrap_amd64.go:225] [ 33762: 33762] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:13.936299 340720 usertrap_amd64.go:212] [ 33761: 33761] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:13.936448 340720 usertrap_amd64.go:122] [ 33761: 33761] Allocate a new trap: 0xc00bf797a0 43 D0307 22:52:13.936616 340720 usertrap_amd64.go:225] [ 33761: 33761] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:13.938129 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.938410 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.942449 340720 usertrap_amd64.go:212] [ 33763: 33763] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:13.942532 340720 usertrap_amd64.go:122] [ 33763: 33763] Allocate a new trap: 0xc0069a3dd0 43 D0307 22:52:13.942610 340720 usertrap_amd64.go:225] [ 33763: 33763] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:13.946407 340720 task_exit.go:204] [ 33763: 33763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.946746 340720 task_exit.go:204] [ 33763: 33763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.946726 340720 task_signals.go:204] [ 33763: 33766] Signal 33763, PID: 33766, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.946872 340720 task_exit.go:204] [ 33763: 33766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.954148 340720 task_exit.go:204] [ 33761: 33761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.954360 340720 task_signals.go:204] [ 33761: 33765] Signal 33761, PID: 33765, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.954619 340720 task_exit.go:204] [ 33761: 33765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.954988 340720 task_exit.go:204] [ 33761: 33761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.955109 340720 task_exit.go:204] [ 33763: 33766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.955150 340720 task_exit.go:204] [ 33763: 33766] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.956481 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:13.957170 340720 usertrap_amd64.go:212] [ 33762: 33762] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:13.957307 340720 usertrap_amd64.go:122] [ 33762: 33762] Allocate a new trap: 0xc00275d860 43 D0307 22:52:13.957326 340720 task_exit.go:204] [ 33763: 33763] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.957396 340720 usertrap_amd64.go:225] [ 33762: 33762] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) 22:52:13 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') D0307 22:52:13.959725 340720 task_exit.go:204] [ 33761: 33765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.959866 340720 task_exit.go:204] [ 33761: 33765] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.959988 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:13.960370 340720 task_exit.go:204] [ 33761: 33761] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.961025 340720 task_exit.go:204] [ 33762: 33762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.961328 340720 task_signals.go:204] [ 33762: 33767] Signal 33762, PID: 33767, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:13.961407 340720 task_exit.go:204] [ 33762: 33767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:13.961676 340720 usertrap_amd64.go:212] [ 33764: 33764] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:13.961734 340720 task_exit.go:204] [ 33762: 33767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.961780 340720 task_exit.go:204] [ 33762: 33767] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.961767 340720 usertrap_amd64.go:122] [ 33764: 33764] Allocate a new trap: 0xc00bf797d0 41 D0307 22:52:13.961881 340720 usertrap_amd64.go:225] [ 33764: 33764] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:13.966332 340720 task_exit.go:204] [ 33762: 33762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:13.966430 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:13.966932 340720 task_exit.go:204] [ 33762: 33762] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:13.971113 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.971574 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:13 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') 22:52:13 executing program 1: r0 = epoll_create(0x1) ioctl$EXT4_IOC_SETFSUUID(r0, 0x5451, 0x0) D0307 22:52:13.984071 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.984422 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.997290 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:13.997745 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:13.999055 340720 usertrap_amd64.go:212] [ 33764: 33764] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:13.999176 340720 usertrap_amd64.go:122] [ 33764: 33764] Allocate a new trap: 0xc00bf797d0 42 D0307 22:52:13.999267 340720 usertrap_amd64.go:225] [ 33764: 33764] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.009063 340720 task_exit.go:204] [ 33764: 33764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.009295 340720 task_signals.go:204] [ 33764: 33768] Signal 33764, PID: 33768, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.009462 340720 task_exit.go:204] [ 33764: 33768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.010091 340720 usertrap_amd64.go:212] [ 33769: 33769] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.010199 340720 usertrap_amd64.go:122] [ 33769: 33769] Allocate a new trap: 0xc0030276e0 40 D0307 22:52:14.010671 340720 usertrap_amd64.go:225] [ 33769: 33769] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.011130 340720 task_exit.go:204] [ 33764: 33764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.013422 340720 task_exit.go:204] [ 33764: 33768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.013510 340720 task_exit.go:204] [ 33764: 33768] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.013606 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.015261 340720 task_exit.go:204] [ 33764: 33764] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x5451, 0x0) D0307 22:52:14.019950 340720 usertrap_amd64.go:212] [ 33770: 33770] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.020090 340720 usertrap_amd64.go:122] [ 33770: 33770] Allocate a new trap: 0xc00996fad0 40 D0307 22:52:14.020577 340720 usertrap_amd64.go:225] [ 33770: 33770] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.024704 340720 usertrap_amd64.go:212] [ 33769: 33769] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.024792 340720 usertrap_amd64.go:122] [ 33769: 33769] Allocate a new trap: 0xc0030276e0 41 D0307 22:52:14.024901 340720 usertrap_amd64.go:225] [ 33769: 33769] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.025350 340720 usertrap_amd64.go:212] [ 33770: 33770] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.025775 340720 usertrap_amd64.go:122] [ 33770: 33770] Allocate a new trap: 0xc00996fad0 41 D0307 22:52:14.025838 340720 usertrap_amd64.go:225] [ 33770: 33770] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:14.028099 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.028580 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.029785 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.030141 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.030390 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.030711 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.048581 340720 usertrap_amd64.go:212] [ 33770: 33770] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:14.048748 340720 usertrap_amd64.go:122] [ 33770: 33770] Allocate a new trap: 0xc00996fad0 42 D0307 22:52:14.048874 340720 usertrap_amd64.go:225] [ 33770: 33770] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:14.048666 340720 usertrap_amd64.go:212] [ 33771: 33771] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.049085 340720 usertrap_amd64.go:122] [ 33771: 33771] Allocate a new trap: 0xc00275da40 40 D0307 22:52:14.050248 340720 usertrap_amd64.go:225] [ 33771: 33771] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.053071 340720 usertrap_amd64.go:212] [ 33771: 33771] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.053169 340720 usertrap_amd64.go:122] [ 33771: 33771] Allocate a new trap: 0xc00275da40 41 D0307 22:52:14.053236 340720 usertrap_amd64.go:225] [ 33771: 33771] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.056087 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.057257 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.061154 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.061598 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.067282 340720 usertrap_amd64.go:212] [ 33771: 33771] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.067392 340720 usertrap_amd64.go:122] [ 33771: 33771] Allocate a new trap: 0xc00275da40 42 D0307 22:52:14.067472 340720 usertrap_amd64.go:225] [ 33771: 33771] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:14.076622 340720 usertrap_amd64.go:212] [ 33769: 33769] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.076736 340720 usertrap_amd64.go:122] [ 33769: 33769] Allocate a new trap: 0xc0030276e0 42 D0307 22:52:14.076803 340720 usertrap_amd64.go:225] [ 33769: 33769] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.078310 340720 usertrap_amd64.go:212] [ 33772: 33772] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.078373 340720 usertrap_amd64.go:122] [ 33772: 33772] Allocate a new trap: 0xc0069a3f20 39 D0307 22:52:14.078781 340720 usertrap_amd64.go:225] [ 33772: 33772] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.083330 340720 usertrap_amd64.go:212] [ 33772: 33772] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.083410 340720 usertrap_amd64.go:212] [ 33770: 33770] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:14.083432 340720 usertrap_amd64.go:122] [ 33772: 33772] Allocate a new trap: 0xc0069a3f20 40 D0307 22:52:14.083461 340720 usertrap_amd64.go:122] [ 33770: 33770] Allocate a new trap: 0xc00996fad0 43 D0307 22:52:14.083525 340720 usertrap_amd64.go:225] [ 33772: 33772] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.083555 340720 usertrap_amd64.go:225] [ 33770: 33770] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:14.084164 340720 usertrap_amd64.go:212] [ 33771: 33771] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.084244 340720 usertrap_amd64.go:122] [ 33771: 33771] Allocate a new trap: 0xc00275da40 43 D0307 22:52:14.084298 340720 usertrap_amd64.go:225] [ 33771: 33771] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.086988 340720 task_exit.go:204] [ 33770: 33770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.087170 340720 task_signals.go:204] [ 33770: 33773] Signal 33770, PID: 33773, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.087389 340720 task_exit.go:204] [ 33770: 33770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.088228 340720 task_exit.go:204] [ 33770: 33773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.091473 340720 task_exit.go:204] [ 33771: 33771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.091628 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.091794 340720 task_exit.go:204] [ 33771: 33771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.092063 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.092173 340720 task_signals.go:204] [ 33771: 33774] Signal 33771, PID: 33774, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.092225 340720 task_exit.go:204] [ 33770: 33773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.092300 340720 task_exit.go:204] [ 33770: 33773] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.092375 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:14.092736 340720 task_exit.go:204] [ 33771: 33774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.093433 340720 task_exit.go:204] [ 33770: 33770] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.093442 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.093833 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:14 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') D0307 22:52:14.096839 340720 task_exit.go:204] [ 33771: 33774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.096919 340720 task_exit.go:204] [ 33771: 33774] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.097071 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.097624 340720 task_exit.go:204] [ 33771: 33771] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.098552 340720 usertrap_amd64.go:212] [ 33769: 33769] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.098605 340720 usertrap_amd64.go:122] [ 33769: 33769] Allocate a new trap: 0xc0030276e0 43 D0307 22:52:14.098677 340720 usertrap_amd64.go:225] [ 33769: 33769] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) 22:52:14 executing program 1: r0 = epoll_create(0x1) ioctl$EXT4_IOC_SETFSUUID(r0, 0x5451, 0x0) D0307 22:52:14.101977 340720 task_exit.go:204] [ 33769: 33769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.102217 340720 task_signals.go:204] [ 33769: 33775] Signal 33769, PID: 33775, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.102248 340720 task_exit.go:204] [ 33769: 33769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.102327 340720 task_exit.go:204] [ 33769: 33775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.104829 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.105307 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.106001 340720 usertrap_amd64.go:212] [ 33772: 33772] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.106203 340720 usertrap_amd64.go:122] [ 33772: 33772] Allocate a new trap: 0xc0069a3f20 41 D0307 22:52:14.106397 340720 usertrap_amd64.go:225] [ 33772: 33772] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.106603 340720 task_exit.go:204] [ 33769: 33775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.106693 340720 task_exit.go:204] [ 33769: 33775] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.106793 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.107267 340720 task_exit.go:204] [ 33769: 33769] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.108474 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.110007 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') D0307 22:52:14.116861 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.117304 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.119853 340720 usertrap_amd64.go:212] [ 33772: 33772] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.119983 340720 usertrap_amd64.go:122] [ 33772: 33772] Allocate a new trap: 0xc0069a3f20 42 D0307 22:52:14.120070 340720 usertrap_amd64.go:225] [ 33772: 33772] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.124865 340720 task_signals.go:204] [ 33772: 33776] Signal 33772, PID: 33776, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.125018 340720 task_exit.go:204] [ 33772: 33776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.125392 340720 task_exit.go:204] [ 33772: 33772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.125652 340720 task_exit.go:204] [ 33772: 33772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.132144 340720 task_exit.go:204] [ 33772: 33776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.132241 340720 task_exit.go:204] [ 33772: 33776] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.132387 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.133494 340720 task_exit.go:204] [ 33772: 33772] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x5451, 0x0) D0307 22:52:14.142287 340720 usertrap_amd64.go:212] [ 33777: 33777] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.142379 340720 usertrap_amd64.go:122] [ 33777: 33777] Allocate a new trap: 0xc0002ee120 40 D0307 22:52:14.143255 340720 usertrap_amd64.go:225] [ 33777: 33777] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.148381 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.148742 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.150747 340720 usertrap_amd64.go:212] [ 33777: 33777] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.150826 340720 usertrap_amd64.go:122] [ 33777: 33777] Allocate a new trap: 0xc0002ee120 41 D0307 22:52:14.150971 340720 usertrap_amd64.go:225] [ 33777: 33777] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:14.152402 340720 usertrap_amd64.go:212] [ 33779: 33779] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.152618 340720 usertrap_amd64.go:122] [ 33779: 33779] Allocate a new trap: 0xc0030278f0 40 D0307 22:52:14.153365 340720 usertrap_amd64.go:225] [ 33779: 33779] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.155765 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.156102 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.157615 340720 usertrap_amd64.go:212] [ 33778: 33778] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.157720 340720 usertrap_amd64.go:122] [ 33778: 33778] Allocate a new trap: 0xc004f836e0 40 D0307 22:52:14.158401 340720 usertrap_amd64.go:225] [ 33778: 33778] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.169325 340720 usertrap_amd64.go:212] [ 33779: 33779] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.169888 340720 usertrap_amd64.go:122] [ 33779: 33779] Allocate a new trap: 0xc0030278f0 41 D0307 22:52:14.169985 340720 usertrap_amd64.go:225] [ 33779: 33779] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.169308 340720 usertrap_amd64.go:212] [ 33778: 33778] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.170379 340720 usertrap_amd64.go:122] [ 33778: 33778] Allocate a new trap: 0xc004f836e0 41 D0307 22:52:14.170612 340720 usertrap_amd64.go:225] [ 33778: 33778] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.173581 340720 usertrap_amd64.go:212] [ 33777: 33777] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:14.173682 340720 usertrap_amd64.go:122] [ 33777: 33777] Allocate a new trap: 0xc0002ee120 42 D0307 22:52:14.173741 340720 usertrap_amd64.go:225] [ 33777: 33777] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:14.174195 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.174620 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.185416 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.185840 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.195697 340720 usertrap_amd64.go:212] [ 33779: 33779] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.195802 340720 usertrap_amd64.go:122] [ 33779: 33779] Allocate a new trap: 0xc0030278f0 42 D0307 22:52:14.195879 340720 usertrap_amd64.go:225] [ 33779: 33779] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.199624 340720 usertrap_amd64.go:212] [ 33780: 33780] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.199719 340720 usertrap_amd64.go:122] [ 33780: 33780] Allocate a new trap: 0xc004637590 39 D0307 22:52:14.200192 340720 usertrap_amd64.go:225] [ 33780: 33780] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.203972 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.204427 340720 usertrap_amd64.go:212] [ 33780: 33780] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.204675 340720 usertrap_amd64.go:122] [ 33780: 33780] Allocate a new trap: 0xc004637590 40 D0307 22:52:14.204859 340720 usertrap_amd64.go:225] [ 33780: 33780] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.204564 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.205656 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.206444 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.207334 340720 usertrap_amd64.go:212] [ 33777: 33777] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:14.207457 340720 usertrap_amd64.go:122] [ 33777: 33777] Allocate a new trap: 0xc0002ee120 43 D0307 22:52:14.207551 340720 usertrap_amd64.go:225] [ 33777: 33777] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:14.209303 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.209713 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.210014 340720 usertrap_amd64.go:212] [ 33779: 33779] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.210161 340720 usertrap_amd64.go:122] [ 33779: 33779] Allocate a new trap: 0xc0030278f0 43 D0307 22:52:14.210282 340720 usertrap_amd64.go:225] [ 33779: 33779] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.216127 340720 task_exit.go:204] [ 33779: 33779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.216400 340720 task_signals.go:204] [ 33779: 33782] Signal 33779, PID: 33782, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.216539 340720 task_exit.go:204] [ 33779: 33782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.217034 340720 task_exit.go:204] [ 33779: 33779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.220521 340720 usertrap_amd64.go:212] [ 33778: 33778] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.220593 340720 usertrap_amd64.go:122] [ 33778: 33778] Allocate a new trap: 0xc004f836e0 42 D0307 22:52:14.220727 340720 usertrap_amd64.go:225] [ 33778: 33778] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:14.223868 340720 task_exit.go:204] [ 33777: 33777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.224132 340720 task_exit.go:204] [ 33777: 33777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.224130 340720 task_signals.go:204] [ 33777: 33781] Signal 33777, PID: 33781, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.224253 340720 task_exit.go:204] [ 33777: 33781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.224644 340720 task_exit.go:204] [ 33779: 33782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.224724 340720 task_exit.go:204] [ 33779: 33782] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.224813 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.226179 340720 task_exit.go:204] [ 33779: 33779] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.228541 340720 task_exit.go:204] [ 33777: 33781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.228593 340720 task_exit.go:204] [ 33777: 33781] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.228671 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 22:52:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') D0307 22:52:14.233199 340720 usertrap_amd64.go:212] [ 33780: 33780] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.233337 340720 usertrap_amd64.go:122] [ 33780: 33780] Allocate a new trap: 0xc004637590 41 D0307 22:52:14.233513 340720 usertrap_amd64.go:225] [ 33780: 33780] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.234920 340720 task_exit.go:204] [ 33777: 33777] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') D0307 22:52:14.238619 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.242113 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.254128 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.254510 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.264250 340720 usertrap_amd64.go:212] [ 33778: 33778] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.264338 340720 usertrap_amd64.go:122] [ 33778: 33778] Allocate a new trap: 0xc004f836e0 43 D0307 22:52:14.264410 340720 usertrap_amd64.go:225] [ 33778: 33778] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.272751 340720 task_exit.go:204] [ 33778: 33778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.273047 340720 task_exit.go:204] [ 33778: 33778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.273544 340720 task_signals.go:204] [ 33778: 33783] Signal 33778, PID: 33783, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.273703 340720 task_exit.go:204] [ 33778: 33783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.279066 340720 usertrap_amd64.go:212] [ 33780: 33780] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.279194 340720 usertrap_amd64.go:122] [ 33780: 33780] Allocate a new trap: 0xc004637590 42 D0307 22:52:14.279312 340720 usertrap_amd64.go:225] [ 33780: 33780] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.279577 340720 usertrap_amd64.go:212] [ 33785: 33785] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.279705 340720 usertrap_amd64.go:122] [ 33785: 33785] Allocate a new trap: 0xc000296f90 40 D0307 22:52:14.279681 340720 task_exit.go:204] [ 33778: 33783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.279830 340720 task_exit.go:204] [ 33778: 33783] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.279946 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.280689 340720 usertrap_amd64.go:225] [ 33785: 33785] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.281274 340720 task_exit.go:204] [ 33778: 33778] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 1: r0 = epoll_create(0x1) ioctl$EXT4_IOC_SETFSUUID(r0, 0x5451, 0x0) D0307 22:52:14.285714 340720 usertrap_amd64.go:212] [ 33785: 33785] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.285889 340720 usertrap_amd64.go:122] [ 33785: 33785] Allocate a new trap: 0xc000296f90 41 D0307 22:52:14.286038 340720 usertrap_amd64.go:225] [ 33785: 33785] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.288041 340720 usertrap_amd64.go:212] [ 33786: 33786] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.288175 340720 usertrap_amd64.go:122] [ 33786: 33786] Allocate a new trap: 0xc0002ee1b0 40 D0307 22:52:14.288275 340720 task_exit.go:204] [ 33780: 33780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.288533 340720 task_signals.go:204] [ 33780: 33784] Signal 33780, PID: 33784, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.288703 340720 usertrap_amd64.go:225] [ 33786: 33786] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.288732 340720 task_exit.go:204] [ 33780: 33780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.289048 340720 task_exit.go:204] [ 33780: 33784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.291201 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.291598 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.293146 340720 usertrap_amd64.go:212] [ 33786: 33786] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.293223 340720 usertrap_amd64.go:122] [ 33786: 33786] Allocate a new trap: 0xc0002ee1b0 41 D0307 22:52:14.293303 340720 usertrap_amd64.go:225] [ 33786: 33786] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:14.293462 340720 task_exit.go:204] [ 33780: 33784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.293561 340720 task_exit.go:204] [ 33780: 33784] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.293656 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.293957 340720 task_exit.go:204] [ 33780: 33780] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x5451, 0x0) D0307 22:52:14.296338 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.297147 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.301498 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.301831 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.309984 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.311009 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.314335 340720 usertrap_amd64.go:212] [ 33785: 33785] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.314422 340720 usertrap_amd64.go:122] [ 33785: 33785] Allocate a new trap: 0xc000296f90 42 D0307 22:52:14.314498 340720 usertrap_amd64.go:225] [ 33785: 33785] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.315249 340720 usertrap_amd64.go:212] [ 33786: 33786] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:14.315344 340720 usertrap_amd64.go:122] [ 33786: 33786] Allocate a new trap: 0xc0002ee1b0 42 D0307 22:52:14.315422 340720 usertrap_amd64.go:225] [ 33786: 33786] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:14.323786 340720 usertrap_amd64.go:212] [ 33787: 33787] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.323906 340720 usertrap_amd64.go:122] [ 33787: 33787] Allocate a new trap: 0xc00bf79bf0 40 D0307 22:52:14.324761 340720 usertrap_amd64.go:225] [ 33787: 33787] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.329865 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.330496 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.333324 340720 usertrap_amd64.go:212] [ 33787: 33787] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.333395 340720 usertrap_amd64.go:122] [ 33787: 33787] Allocate a new trap: 0xc00bf79bf0 41 D0307 22:52:14.333472 340720 usertrap_amd64.go:225] [ 33787: 33787] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.337425 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.337620 340720 usertrap_amd64.go:212] [ 33785: 33785] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.337728 340720 usertrap_amd64.go:122] [ 33785: 33785] Allocate a new trap: 0xc000296f90 43 D0307 22:52:14.337820 340720 usertrap_amd64.go:225] [ 33785: 33785] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.337910 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.339211 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.339591 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.341580 340720 usertrap_amd64.go:212] [ 33786: 33786] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:14.341683 340720 usertrap_amd64.go:122] [ 33786: 33786] Allocate a new trap: 0xc0002ee1b0 43 D0307 22:52:14.341784 340720 usertrap_amd64.go:225] [ 33786: 33786] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:14.345836 340720 task_exit.go:204] [ 33785: 33785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.346136 340720 task_exit.go:204] [ 33785: 33785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.346423 340720 task_signals.go:204] [ 33785: 33789] Signal 33785, PID: 33789, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.346745 340720 task_exit.go:204] [ 33785: 33789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.350393 340720 usertrap_amd64.go:212] [ 33790: 33790] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.350489 340720 usertrap_amd64.go:122] [ 33790: 33790] Allocate a new trap: 0xc003027aa0 39 D0307 22:52:14.351254 340720 usertrap_amd64.go:225] [ 33790: 33790] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.353421 340720 task_exit.go:204] [ 33785: 33789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.353601 340720 task_exit.go:204] [ 33785: 33789] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.353733 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.354117 340720 task_exit.go:204] [ 33785: 33785] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.357596 340720 task_exit.go:204] [ 33786: 33786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.357946 340720 task_exit.go:204] [ 33786: 33786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.357915 340720 task_signals.go:204] [ 33786: 33788] Signal 33786, PID: 33788, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.358210 340720 task_exit.go:204] [ 33786: 33788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.361954 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.362339 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.363236 340720 task_exit.go:204] [ 33786: 33788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.363383 340720 task_exit.go:204] [ 33786: 33788] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.363505 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:14.363716 340720 task_exit.go:204] [ 33786: 33786] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5452, &(0x7f0000000000)={'vcan0\x00'}) D0307 22:52:14.366366 340720 usertrap_amd64.go:212] [ 33790: 33790] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.366445 340720 usertrap_amd64.go:122] [ 33790: 33790] Allocate a new trap: 0xc003027aa0 40 D0307 22:52:14.366511 340720 usertrap_amd64.go:225] [ 33790: 33790] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.367993 340720 usertrap_amd64.go:212] [ 33787: 33787] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.368085 340720 usertrap_amd64.go:122] [ 33787: 33787] Allocate a new trap: 0xc00bf79bf0 42 D0307 22:52:14.368214 340720 usertrap_amd64.go:225] [ 33787: 33787] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) 22:52:14 executing program 3: r0 = memfd_create(&(0x7f00000005c0)='/dev/\"\x00\x00\x00\x00\x00\x00\x00\xe8\x00\xeb\xdaz\x98\x00\xc8\x8d\x93\a\x8a\x8bYd>\x7f\xbek\x7fN\x1e\xdf\xf89_\xad\x8fv\x80\xab!S\xe8\xe1\x05.!N<\x8e\xe2sNL\\\xc0\xe7Z\x1av\xc0+X\x8d\xddx\xc6\xb6P\x1d\xfd\x90\x00\x00\x00\x04{\x1cB\xd5Feb\xd5\xb7V\x8dX\x10_p)\xba|7\xa4\xb8\xfb\xd62(\x92\\\xc3j\x870\xe5\x8c.\x955,`=\xdca\xda\x96)n\xe3\xa0\x03\xde\xd5\xfb\xb8\xdc\x18`\xd1S\x81\x88\xf9J~\x9d!\xbcw\xf6\xfb\xe3\xd1T\xd8\x9ft\x00\xd2\xaf\xeeZ\xbe\x89\n\x14\xa3\x83\x13i\xed\xe2\x92\xa8\x10\x80O\xaaw\xf7[\x7f\x16#\xe4\x9e\x86j\x9c\x8e\xbf\x12\xdc\x19$5zf\x98V\x1aj\xd3\xc42\x06\xab\x98{\xbd\xcb=\x92\xe1\xe33\xb2-\xfe\xbd\xc6\xbb\xc6\x85\xd1\x84\x0eD\x7f\x12\xf7\x19\xd0N\xd1\xc4:\xb5\xae\x93\x8f\x8c\xe7H\x8d\xb2\x9c\xd1\x1f\xc6\xce\xb7\xb5(\x8dC$~\t0l\x91p\xba\xe8[\xb7U\a!\x11\x14M\x1f\xe0?X\v\xd6\xd8\xfa\xcc\xfe\xe8\xbe\xe4\xc6\xc5(]\xafVD6BR\xfd\x97P\xd7.D\xcf\xba\xc4\x91t\x80\x83\x95\'\xd9\x01\x80\xcd\xb7w\xc1\x17m3\xa7\xeah\xd1\x91\xac\x0e\xfc\xd7{Sw\xac-\x81\xa5\x1e\\\x10\xe2\xde\xb9\xe9j\"Fg-}m\x93H^1E\xf9\xc6*-/\xa0\x8b\xb8T\x16\xccR\x96i\x05}=\x13.\xae\xb0\xec\xb3\xc2\xacu\x96/\xe8\xc8\x0eP#\x86\xf3\x8eh\xe7\x9b\xee\x06\x9a\x81\xb0\xfam\xbd\xb0uA\x9d\x166\xd3p\x92j\x0e\xcbf\x14Q\x0fg\xbby\x1a\xb6\xb7t\xf76\xa3h\x04\\+\x9e\xb6\xbf\xacH\xd4\x1e\xb0\xdf\x8cqy\xd2,?\v\xf50\x9d\xb7\r\xc7O\x13\xf7b\xb8\xea\x16lQ\x04\v8\xf8W\xb7\xbcD\x14\xe1\xf1V\b\x82:Q[\x94^\xa3;a?H\xc9\xa75=\xb3\xc9*5\xfc\xa3\x15\x05\x8b>\'e~\xff\a\x00\x00\x00\x00\x00\x00\x80\xdb\b\x7f\x83\x11\'\x9e\xeb\xfa\xbeo\v\x86\xc7\x97\xa8\xef\x95\xfd\xe9G\x18t\xdbt\x81cW\x19\xe5A\x1a\x89\xf6]\xc1\xe8\x9c\x92`\x13\x9e\x1bNW\xba\x93\x1d\xc5\xfa\xb9g\x96\x82\x81f\xad\x06\r\xe4V\x1c\xe9n\xb8\xe9\xf7\xe0\x82\xe8\xa4E\xba\x93D\x9e\xf6\x16\xda$\x83\xdf\xdf\xa7\xb92y\\\xb8\x99\xe3i\xa3\xba\x0f\x85#C\x948\x89\x94\xd4\xaeS\xa4\x83x\xdc\x87\xb9)0\'x\xa4%{\x89\xe6W\x7f\x85\xa7\xd3\x16_\xae\xdd\xc3\x86\"\xe0\xae\xd5\xf2\xff\xc2W\a2\xf8\xa0\xb1\xb2J\xa7\x11o^\xd9\xa2\x89]\xcd\xbb\xb7\x15lC\b\x83\xba0\x9e@/\x80\\zJ\xd9)\x92\x1c\x88#:\xc8\xa0;\x98r\xd9(\x1c\x10\x9b\xe26\xc2\x00\x81\xf4!:C-m\x900\xce\x88\x00M\x86\xcbc\x86a\xd7\xf6\xc2Q\x12~\t\x01:\n\xff$\xf1\'\xe0\xa2E\xb8T<\xd5\xf7A\xafE\x9b\\p\xa7\xa7\x9e\xec\xc2%\xe6\x1e\x90\xa9\xca!\x9d.\xb3\xfc\xd9[\xbeBI\x97-+\xe3#\x8f\xbd\x89u\xe2}\xfa\x82\xe5\xdaSo_\xdd\x93g\x04\xf3R\x10Q\xc3,zfJ\xd6\x82*eS\xa2\x9b4TA\xbf\x8a./\xe0-\xd8\xf1\t\x18~\x1c\x82\xe4\xfa;\x9a&Mb37\xc0\xb1o\x05P\xe3\xfa:~\xf1s\xb9\xafH\xaeP\xa6\xbcl\xad\a\xdcK\xa1uO\xb5O\xfch\xc9\xd3\xb0\xf3\'\xa0E5\xb4M\rt\'\xb1\xd3\x1d\'\tF\xfbxddNpS\xee\x1e\x04J\xe0h\x96\x9eK\x1aF%\xc67\xd3\xc0\xd8\xa0*$0\x00\xd0\xea\xb5%\x91m7\xdf\xdcr\xcfWH\xde\xc0\t\x8a\t\x9f_\x82\xd8`\xa2Ed\xfbSp\x1cZ\x951\x9fN\x15\xc9\x06\xc7*\xda\xa9`\x1b\xc9\xec{\xfa\xa3k\xc1Q\xf3\xbf\xfdk\xdc\xd0\xaf\x93o\xe7C\x8a(\x1fb\xc7A\x91\xb6\xf71_M\xff\xb7L8\xf3H[\xdb\xf2\'S\xd2\xbf\x12#\xec\xf9d\xa2\xc9U\x03\x00\xcb3:\xbc\xe7\xa3\x7f\x8a\xc5\x8ev\x8d\xe5\xe36\x98[ j7\xf5\xbbsN\x1a\xec\x8c\xd4@\x0f\xed*}KI\x06hFm\xce{\xa4\xa2!\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\a\xecb^[k\x88%\x11\xdaJ\x82\x00t\xc9<3\x1dNe\"\xed~\xbf', 0x0) ftruncate(r0, 0xffffff) r1 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000580), 0x4) sendfile(r1, r0, 0x0, 0x1e3a) sendmsg$inet(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x0) D0307 22:52:14.372572 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.375355 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.376415 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.377595 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.397272 340720 usertrap_amd64.go:212] [ 33790: 33790] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.397475 340720 usertrap_amd64.go:122] [ 33790: 33790] Allocate a new trap: 0xc003027aa0 41 D0307 22:52:14.397611 340720 usertrap_amd64.go:225] [ 33790: 33790] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.401537 340720 usertrap_amd64.go:212] [ 33792: 33792] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.401668 340720 usertrap_amd64.go:122] [ 33792: 33792] Allocate a new trap: 0xc00275ddd0 40 D0307 22:52:14.402348 340720 usertrap_amd64.go:225] [ 33792: 33792] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.404004 340720 usertrap_amd64.go:212] [ 33787: 33787] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.404110 340720 usertrap_amd64.go:122] [ 33787: 33787] Allocate a new trap: 0xc00bf79bf0 43 D0307 22:52:14.405093 340720 usertrap_amd64.go:225] [ 33787: 33787] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.406041 340720 usertrap_amd64.go:212] [ 33792: 33792] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.406225 340720 usertrap_amd64.go:122] [ 33792: 33792] Allocate a new trap: 0xc00275ddd0 41 D0307 22:52:14.406411 340720 usertrap_amd64.go:225] [ 33792: 33792] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.409892 340720 task_exit.go:204] [ 33787: 33787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.410215 340720 task_exit.go:204] [ 33787: 33787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.410496 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.410717 340720 task_signals.go:204] [ 33787: 33791] Signal 33787, PID: 33791, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.410889 340720 task_exit.go:204] [ 33787: 33791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.410919 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.415244 340720 task_exit.go:204] [ 33787: 33791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.415677 340720 task_exit.go:204] [ 33787: 33791] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.415825 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.416007 340720 task_exit.go:204] [ 33787: 33787] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 1: r0 = epoll_create(0x1) ioctl$EXT4_IOC_SETFSUUID(r0, 0x5451, 0x0) D0307 22:52:14.427073 340720 usertrap_amd64.go:212] [ 33790: 33790] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.427211 340720 usertrap_amd64.go:122] [ 33790: 33790] Allocate a new trap: 0xc003027aa0 42 D0307 22:52:14.428071 340720 usertrap_amd64.go:225] [ 33790: 33790] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.428638 340720 usertrap_amd64.go:212] [ 33793: 33793] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.428766 340720 usertrap_amd64.go:122] [ 33793: 33793] Allocate a new trap: 0xc004637830 40 D0307 22:52:14.429396 340720 usertrap_amd64.go:225] [ 33793: 33793] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.431162 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.431687 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.432775 340720 task_exit.go:204] [ 33790: 33790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.433150 340720 task_signals.go:204] [ 33790: 33794] Signal 33790, PID: 33794, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.433173 340720 task_exit.go:204] [ 33790: 33790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.433608 340720 task_exit.go:204] [ 33790: 33794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.434747 340720 usertrap_amd64.go:212] [ 33792: 33792] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.434934 340720 usertrap_amd64.go:122] [ 33792: 33792] Allocate a new trap: 0xc00275ddd0 42 D0307 22:52:14.435088 340720 usertrap_amd64.go:225] [ 33792: 33792] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.437848 340720 task_exit.go:204] [ 33790: 33794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.437937 340720 task_exit.go:204] [ 33790: 33794] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.438083 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.439581 340720 task_exit.go:204] [ 33790: 33790] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.439695 340720 usertrap_amd64.go:212] [ 33793: 33793] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.439740 340720 usertrap_amd64.go:122] [ 33793: 33793] Allocate a new trap: 0xc004637830 41 D0307 22:52:14.439795 340720 usertrap_amd64.go:225] [ 33793: 33793] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) 22:52:14 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) D0307 22:52:14.450420 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.450888 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.451781 340720 usertrap_amd64.go:212] [ 33792: 33792] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.451851 340720 usertrap_amd64.go:122] [ 33792: 33792] Allocate a new trap: 0xc00275ddd0 43 D0307 22:52:14.451924 340720 usertrap_amd64.go:225] [ 33792: 33792] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.461711 340720 task_exit.go:204] [ 33792: 33792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.461888 340720 task_signals.go:204] [ 33792: 33795] Signal 33792, PID: 33795, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.461965 340720 task_exit.go:204] [ 33792: 33792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.462032 340720 task_exit.go:204] [ 33792: 33795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.463327 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.463997 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.465429 340720 task_exit.go:204] [ 33792: 33795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.465541 340720 task_exit.go:204] [ 33792: 33795] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.465736 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.465948 340720 task_exit.go:204] [ 33792: 33792] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5452, &(0x7f0000000000)={'vcan0\x00'}) D0307 22:52:14.480101 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.480488 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.482204 340720 usertrap_amd64.go:212] [ 33796: 33796] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.482331 340720 usertrap_amd64.go:122] [ 33796: 33796] Allocate a new trap: 0xc004637860 40 D0307 22:52:14.483296 340720 usertrap_amd64.go:225] [ 33796: 33796] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.484324 340720 usertrap_amd64.go:212] [ 33797: 33797] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.484489 340720 usertrap_amd64.go:122] [ 33797: 33797] Allocate a new trap: 0xc0003eac60 39 D0307 22:52:14.485076 340720 usertrap_amd64.go:225] [ 33797: 33797] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.487191 340720 usertrap_amd64.go:212] [ 33796: 33796] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.487290 340720 usertrap_amd64.go:122] [ 33796: 33796] Allocate a new trap: 0xc004637860 41 D0307 22:52:14.487382 340720 usertrap_amd64.go:225] [ 33796: 33796] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.496187 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.496614 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.501208 340720 usertrap_amd64.go:212] [ 33797: 33797] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.501298 340720 usertrap_amd64.go:122] [ 33797: 33797] Allocate a new trap: 0xc0003eac60 40 D0307 22:52:14.501398 340720 usertrap_amd64.go:225] [ 33797: 33797] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.506965 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.507354 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.515213 340720 usertrap_amd64.go:212] [ 33793: 33793] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:14.515334 340720 usertrap_amd64.go:122] [ 33793: 33793] Allocate a new trap: 0xc004637830 42 D0307 22:52:14.515395 340720 usertrap_amd64.go:225] [ 33793: 33793] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:14.526780 340720 usertrap_amd64.go:212] [ 33798: 33798] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.526921 340720 usertrap_amd64.go:122] [ 33798: 33798] Allocate a new trap: 0xc00275dfb0 40 D0307 22:52:14.531419 340720 usertrap_amd64.go:212] [ 33796: 33796] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.531493 340720 usertrap_amd64.go:122] [ 33796: 33796] Allocate a new trap: 0xc004637860 42 D0307 22:52:14.531569 340720 usertrap_amd64.go:225] [ 33796: 33796] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:14.532162 340720 usertrap_amd64.go:225] [ 33798: 33798] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.541800 340720 usertrap_amd64.go:212] [ 33798: 33798] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.541904 340720 usertrap_amd64.go:122] [ 33798: 33798] Allocate a new trap: 0xc00275dfb0 41 D0307 22:52:14.541961 340720 usertrap_amd64.go:225] [ 33798: 33798] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.546139 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.546681 340720 usertrap_amd64.go:212] [ 33796: 33796] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.546774 340720 usertrap_amd64.go:122] [ 33796: 33796] Allocate a new trap: 0xc004637860 43 D0307 22:52:14.546836 340720 usertrap_amd64.go:225] [ 33796: 33796] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.547251 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.551548 340720 task_exit.go:204] [ 33796: 33796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.551815 340720 task_exit.go:204] [ 33796: 33796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.551989 340720 task_signals.go:204] [ 33796: 33800] Signal 33796, PID: 33800, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.552142 340720 task_exit.go:204] [ 33796: 33800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.556058 340720 task_exit.go:204] [ 33796: 33800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.556168 340720 task_exit.go:204] [ 33796: 33800] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.556272 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.556518 340720 task_exit.go:204] [ 33796: 33796] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.558730 340720 usertrap_amd64.go:212] [ 33797: 33797] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.558791 340720 usertrap_amd64.go:122] [ 33797: 33797] Allocate a new trap: 0xc0003eac60 41 D0307 22:52:14.558891 340720 usertrap_amd64.go:225] [ 33797: 33797] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.561250 340720 usertrap_amd64.go:212] [ 33793: 33793] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:14.561322 340720 usertrap_amd64.go:122] [ 33793: 33793] Allocate a new trap: 0xc004637830 43 D0307 22:52:14.561402 340720 usertrap_amd64.go:225] [ 33793: 33793] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) 22:52:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETATTR(r0, &(0x7f0000000600)={0xa0}, 0xa0) D0307 22:52:14.565491 340720 task_exit.go:204] [ 33793: 33793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.565563 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.565812 340720 task_exit.go:204] [ 33793: 33793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.565799 340720 task_signals.go:204] [ 33793: 33799] Signal 33793, PID: 33799, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.565958 340720 task_exit.go:204] [ 33793: 33799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.569389 340720 task_exit.go:204] [ 33793: 33799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.569448 340720 task_exit.go:204] [ 33793: 33799] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.569525 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:14.569784 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.570556 340720 task_exit.go:204] [ 33793: 33793] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 3: r0 = memfd_create(&(0x7f00000005c0)='/dev/\"\x00\x00\x00\x00\x00\x00\x00\xe8\x00\xeb\xdaz\x98\x00\xc8\x8d\x93\a\x8a\x8bYd>\x7f\xbek\x7fN\x1e\xdf\xf89_\xad\x8fv\x80\xab!S\xe8\xe1\x05.!N<\x8e\xe2sNL\\\xc0\xe7Z\x1av\xc0+X\x8d\xddx\xc6\xb6P\x1d\xfd\x90\x00\x00\x00\x04{\x1cB\xd5Feb\xd5\xb7V\x8dX\x10_p)\xba|7\xa4\xb8\xfb\xd62(\x92\\\xc3j\x870\xe5\x8c.\x955,`=\xdca\xda\x96)n\xe3\xa0\x03\xde\xd5\xfb\xb8\xdc\x18`\xd1S\x81\x88\xf9J~\x9d!\xbcw\xf6\xfb\xe3\xd1T\xd8\x9ft\x00\xd2\xaf\xeeZ\xbe\x89\n\x14\xa3\x83\x13i\xed\xe2\x92\xa8\x10\x80O\xaaw\xf7[\x7f\x16#\xe4\x9e\x86j\x9c\x8e\xbf\x12\xdc\x19$5zf\x98V\x1aj\xd3\xc42\x06\xab\x98{\xbd\xcb=\x92\xe1\xe33\xb2-\xfe\xbd\xc6\xbb\xc6\x85\xd1\x84\x0eD\x7f\x12\xf7\x19\xd0N\xd1\xc4:\xb5\xae\x93\x8f\x8c\xe7H\x8d\xb2\x9c\xd1\x1f\xc6\xce\xb7\xb5(\x8dC$~\t0l\x91p\xba\xe8[\xb7U\a!\x11\x14M\x1f\xe0?X\v\xd6\xd8\xfa\xcc\xfe\xe8\xbe\xe4\xc6\xc5(]\xafVD6BR\xfd\x97P\xd7.D\xcf\xba\xc4\x91t\x80\x83\x95\'\xd9\x01\x80\xcd\xb7w\xc1\x17m3\xa7\xeah\xd1\x91\xac\x0e\xfc\xd7{Sw\xac-\x81\xa5\x1e\\\x10\xe2\xde\xb9\xe9j\"Fg-}m\x93H^1E\xf9\xc6*-/\xa0\x8b\xb8T\x16\xccR\x96i\x05}=\x13.\xae\xb0\xec\xb3\xc2\xacu\x96/\xe8\xc8\x0eP#\x86\xf3\x8eh\xe7\x9b\xee\x06\x9a\x81\xb0\xfam\xbd\xb0uA\x9d\x166\xd3p\x92j\x0e\xcbf\x14Q\x0fg\xbby\x1a\xb6\xb7t\xf76\xa3h\x04\\+\x9e\xb6\xbf\xacH\xd4\x1e\xb0\xdf\x8cqy\xd2,?\v\xf50\x9d\xb7\r\xc7O\x13\xf7b\xb8\xea\x16lQ\x04\v8\xf8W\xb7\xbcD\x14\xe1\xf1V\b\x82:Q[\x94^\xa3;a?H\xc9\xa75=\xb3\xc9*5\xfc\xa3\x15\x05\x8b>\'e~\xff\a\x00\x00\x00\x00\x00\x00\x80\xdb\b\x7f\x83\x11\'\x9e\xeb\xfa\xbeo\v\x86\xc7\x97\xa8\xef\x95\xfd\xe9G\x18t\xdbt\x81cW\x19\xe5A\x1a\x89\xf6]\xc1\xe8\x9c\x92`\x13\x9e\x1bNW\xba\x93\x1d\xc5\xfa\xb9g\x96\x82\x81f\xad\x06\r\xe4V\x1c\xe9n\xb8\xe9\xf7\xe0\x82\xe8\xa4E\xba\x93D\x9e\xf6\x16\xda$\x83\xdf\xdf\xa7\xb92y\\\xb8\x99\xe3i\xa3\xba\x0f\x85#C\x948\x89\x94\xd4\xaeS\xa4\x83x\xdc\x87\xb9)0\'x\xa4%{\x89\xe6W\x7f\x85\xa7\xd3\x16_\xae\xdd\xc3\x86\"\xe0\xae\xd5\xf2\xff\xc2W\a2\xf8\xa0\xb1\xb2J\xa7\x11o^\xd9\xa2\x89]\xcd\xbb\xb7\x15lC\b\x83\xba0\x9e@/\x80\\zJ\xd9)\x92\x1c\x88#:\xc8\xa0;\x98r\xd9(\x1c\x10\x9b\xe26\xc2\x00\x81\xf4!:C-m\x900\xce\x88\x00M\x86\xcbc\x86a\xd7\xf6\xc2Q\x12~\t\x01:\n\xff$\xf1\'\xe0\xa2E\xb8T<\xd5\xf7A\xafE\x9b\\p\xa7\xa7\x9e\xec\xc2%\xe6\x1e\x90\xa9\xca!\x9d.\xb3\xfc\xd9[\xbeBI\x97-+\xe3#\x8f\xbd\x89u\xe2}\xfa\x82\xe5\xdaSo_\xdd\x93g\x04\xf3R\x10Q\xc3,zfJ\xd6\x82*eS\xa2\x9b4TA\xbf\x8a./\xe0-\xd8\xf1\t\x18~\x1c\x82\xe4\xfa;\x9a&Mb37\xc0\xb1o\x05P\xe3\xfa:~\xf1s\xb9\xafH\xaeP\xa6\xbcl\xad\a\xdcK\xa1uO\xb5O\xfch\xc9\xd3\xb0\xf3\'\xa0E5\xb4M\rt\'\xb1\xd3\x1d\'\tF\xfbxddNpS\xee\x1e\x04J\xe0h\x96\x9eK\x1aF%\xc67\xd3\xc0\xd8\xa0*$0\x00\xd0\xea\xb5%\x91m7\xdf\xdcr\xcfWH\xde\xc0\t\x8a\t\x9f_\x82\xd8`\xa2Ed\xfbSp\x1cZ\x951\x9fN\x15\xc9\x06\xc7*\xda\xa9`\x1b\xc9\xec{\xfa\xa3k\xc1Q\xf3\xbf\xfdk\xdc\xd0\xaf\x93o\xe7C\x8a(\x1fb\xc7A\x91\xb6\xf71_M\xff\xb7L8\xf3H[\xdb\xf2\'S\xd2\xbf\x12#\xec\xf9d\xa2\xc9U\x03\x00\xcb3:\xbc\xe7\xa3\x7f\x8a\xc5\x8ev\x8d\xe5\xe36\x98[ j7\xf5\xbbsN\x1a\xec\x8c\xd4@\x0f\xed*}KI\x06hFm\xce{\xa4\xa2!\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\a\xecb^[k\x88%\x11\xdaJ\x82\x00t\xc9<3\x1dNe\"\xed~\xbf', 0x0) ftruncate(r0, 0xffffff) r1 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000580), 0x4) sendfile(r1, r0, 0x0, 0x1e3a) sendmsg$inet(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x0) D0307 22:52:14.574054 340720 usertrap_amd64.go:212] [ 33798: 33798] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.574157 340720 usertrap_amd64.go:122] [ 33798: 33798] Allocate a new trap: 0xc00275dfb0 42 D0307 22:52:14.574218 340720 usertrap_amd64.go:225] [ 33798: 33798] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.583925 340720 usertrap_amd64.go:212] [ 33797: 33797] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.584005 340720 usertrap_amd64.go:122] [ 33797: 33797] Allocate a new trap: 0xc0003eac60 42 D0307 22:52:14.584093 340720 usertrap_amd64.go:225] [ 33797: 33797] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.590654 340720 task_exit.go:204] [ 33797: 33797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.590798 340720 task_signals.go:204] [ 33797: 33801] Signal 33797, PID: 33801, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.590993 340720 task_exit.go:204] [ 33797: 33797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.591637 340720 task_exit.go:204] [ 33797: 33801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.595707 340720 task_exit.go:204] [ 33797: 33801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.595791 340720 task_exit.go:204] [ 33797: 33801] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.595869 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.597294 340720 task_exit.go:204] [ 33797: 33797] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) D0307 22:52:14.599264 340720 usertrap_amd64.go:212] [ 33798: 33798] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.599347 340720 usertrap_amd64.go:122] [ 33798: 33798] Allocate a new trap: 0xc00275dfb0 43 D0307 22:52:14.599459 340720 usertrap_amd64.go:225] [ 33798: 33798] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.601719 340720 task_exit.go:204] [ 33798: 33798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.601925 340720 task_exit.go:204] [ 33798: 33798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.602129 340720 task_signals.go:204] [ 33798: 33802] Signal 33798, PID: 33802, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.602236 340720 task_exit.go:204] [ 33798: 33802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.607565 340720 task_exit.go:204] [ 33798: 33802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.607663 340720 task_exit.go:204] [ 33798: 33802] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.607768 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.608193 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.608661 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.608767 340720 task_exit.go:204] [ 33798: 33798] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.610490 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.610804 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:14 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5452, &(0x7f0000000000)={'vcan0\x00'}) D0307 22:52:14.622313 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.622671 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.626150 340720 usertrap_amd64.go:212] [ 33803: 33803] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.626255 340720 usertrap_amd64.go:122] [ 33803: 33803] Allocate a new trap: 0xc00bf79ce0 40 D0307 22:52:14.626977 340720 usertrap_amd64.go:225] [ 33803: 33803] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.643989 340720 usertrap_amd64.go:212] [ 33805: 33805] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.644095 340720 usertrap_amd64.go:122] [ 33805: 33805] Allocate a new trap: 0xc001054030 40 D0307 22:52:14.644621 340720 usertrap_amd64.go:225] [ 33805: 33805] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.649394 340720 usertrap_amd64.go:212] [ 33805: 33805] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.649492 340720 usertrap_amd64.go:122] [ 33805: 33805] Allocate a new trap: 0xc001054030 41 D0307 22:52:14.649567 340720 usertrap_amd64.go:225] [ 33805: 33805] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:14.656823 340720 usertrap_amd64.go:212] [ 33803: 33803] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.656919 340720 usertrap_amd64.go:122] [ 33803: 33803] Allocate a new trap: 0xc00bf79ce0 41 D0307 22:52:14.657024 340720 usertrap_amd64.go:225] [ 33803: 33803] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.657509 340720 usertrap_amd64.go:212] [ 33804: 33804] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.657660 340720 usertrap_amd64.go:122] [ 33804: 33804] Allocate a new trap: 0xc000297290 39 D0307 22:52:14.658170 340720 usertrap_amd64.go:225] [ 33804: 33804] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.661678 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.662153 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.662945 340720 usertrap_amd64.go:212] [ 33804: 33804] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.663060 340720 usertrap_amd64.go:122] [ 33804: 33804] Allocate a new trap: 0xc000297290 40 D0307 22:52:14.663183 340720 usertrap_amd64.go:225] [ 33804: 33804] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.664345 340720 usertrap_amd64.go:212] [ 33806: 33806] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.664471 340720 usertrap_amd64.go:122] [ 33806: 33806] Allocate a new trap: 0xc0002ee4e0 40 D0307 22:52:14.665313 340720 usertrap_amd64.go:225] [ 33806: 33806] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.668430 340720 usertrap_amd64.go:212] [ 33806: 33806] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.668519 340720 usertrap_amd64.go:122] [ 33806: 33806] Allocate a new trap: 0xc0002ee4e0 41 D0307 22:52:14.668596 340720 usertrap_amd64.go:225] [ 33806: 33806] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.674400 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.675313 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.678818 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.679158 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.679828 340720 usertrap_amd64.go:212] [ 33805: 33805] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:14.679904 340720 usertrap_amd64.go:122] [ 33805: 33805] Allocate a new trap: 0xc001054030 42 D0307 22:52:14.679977 340720 usertrap_amd64.go:225] [ 33805: 33805] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:14.685615 340720 usertrap_amd64.go:212] [ 33803: 33803] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.685705 340720 usertrap_amd64.go:122] [ 33803: 33803] Allocate a new trap: 0xc00bf79ce0 42 D0307 22:52:14.685774 340720 usertrap_amd64.go:225] [ 33803: 33803] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:14.690350 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.690765 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.697055 340720 usertrap_amd64.go:212] [ 33806: 33806] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.697174 340720 usertrap_amd64.go:122] [ 33806: 33806] Allocate a new trap: 0xc0002ee4e0 42 D0307 22:52:14.697270 340720 usertrap_amd64.go:225] [ 33806: 33806] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.707160 340720 usertrap_amd64.go:212] [ 33803: 33803] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.707264 340720 usertrap_amd64.go:122] [ 33803: 33803] Allocate a new trap: 0xc00bf79ce0 43 D0307 22:52:14.707321 340720 usertrap_amd64.go:225] [ 33803: 33803] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.710108 340720 usertrap_amd64.go:212] [ 33804: 33804] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.710230 340720 usertrap_amd64.go:122] [ 33804: 33804] Allocate a new trap: 0xc000297290 41 D0307 22:52:14.710292 340720 usertrap_amd64.go:225] [ 33804: 33804] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.717230 340720 task_exit.go:204] [ 33803: 33803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.717464 340720 task_exit.go:204] [ 33803: 33803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.717742 340720 task_signals.go:204] [ 33803: 33808] Signal 33803, PID: 33808, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.717849 340720 task_exit.go:204] [ 33803: 33808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.718718 340720 usertrap_amd64.go:212] [ 33805: 33805] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:14.718866 340720 usertrap_amd64.go:122] [ 33805: 33805] Allocate a new trap: 0xc001054030 43 D0307 22:52:14.718980 340720 usertrap_amd64.go:225] [ 33805: 33805] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:14.722535 340720 usertrap_amd64.go:212] [ 33806: 33806] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.722664 340720 usertrap_amd64.go:122] [ 33806: 33806] Allocate a new trap: 0xc0002ee4e0 43 D0307 22:52:14.722783 340720 usertrap_amd64.go:225] [ 33806: 33806] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.722586 340720 task_exit.go:204] [ 33803: 33808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.723067 340720 task_exit.go:204] [ 33803: 33808] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.723274 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.723894 340720 task_exit.go:204] [ 33803: 33803] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.727816 340720 task_exit.go:204] [ 33806: 33806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.728026 340720 task_exit.go:204] [ 33806: 33806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.728176 340720 task_signals.go:204] [ 33806: 33809] Signal 33806, PID: 33809, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.728298 340720 task_exit.go:204] [ 33806: 33809] Transitioning from exit state TaskExitNone to TaskExitInitiated 22:52:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETATTR(r0, &(0x7f0000000600)={0xa0}, 0xa0) D0307 22:52:14.731157 340720 task_exit.go:204] [ 33806: 33809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.731235 340720 task_exit.go:204] [ 33806: 33809] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.731337 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.731666 340720 task_exit.go:204] [ 33805: 33805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.731816 340720 task_signals.go:204] [ 33805: 33807] Signal 33805, PID: 33807, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.731897 340720 task_exit.go:204] [ 33806: 33806] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.732035 340720 task_exit.go:204] [ 33805: 33805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.732442 340720 task_exit.go:204] [ 33805: 33807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.737500 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.737898 340720 task_exit.go:204] [ 33805: 33807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.737920 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.737959 340720 task_exit.go:204] [ 33805: 33807] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.738037 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:14.738225 340720 usertrap_amd64.go:212] [ 33804: 33804] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.738293 340720 usertrap_amd64.go:122] [ 33804: 33804] Allocate a new trap: 0xc000297290 42 D0307 22:52:14.738302 340720 task_exit.go:204] [ 33805: 33805] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.738368 340720 usertrap_amd64.go:225] [ 33804: 33804] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) 22:52:14 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5452, &(0x7f0000000000)={'vcan0\x00'}) 22:52:14 executing program 3: r0 = memfd_create(&(0x7f00000005c0)='/dev/\"\x00\x00\x00\x00\x00\x00\x00\xe8\x00\xeb\xdaz\x98\x00\xc8\x8d\x93\a\x8a\x8bYd>\x7f\xbek\x7fN\x1e\xdf\xf89_\xad\x8fv\x80\xab!S\xe8\xe1\x05.!N<\x8e\xe2sNL\\\xc0\xe7Z\x1av\xc0+X\x8d\xddx\xc6\xb6P\x1d\xfd\x90\x00\x00\x00\x04{\x1cB\xd5Feb\xd5\xb7V\x8dX\x10_p)\xba|7\xa4\xb8\xfb\xd62(\x92\\\xc3j\x870\xe5\x8c.\x955,`=\xdca\xda\x96)n\xe3\xa0\x03\xde\xd5\xfb\xb8\xdc\x18`\xd1S\x81\x88\xf9J~\x9d!\xbcw\xf6\xfb\xe3\xd1T\xd8\x9ft\x00\xd2\xaf\xeeZ\xbe\x89\n\x14\xa3\x83\x13i\xed\xe2\x92\xa8\x10\x80O\xaaw\xf7[\x7f\x16#\xe4\x9e\x86j\x9c\x8e\xbf\x12\xdc\x19$5zf\x98V\x1aj\xd3\xc42\x06\xab\x98{\xbd\xcb=\x92\xe1\xe33\xb2-\xfe\xbd\xc6\xbb\xc6\x85\xd1\x84\x0eD\x7f\x12\xf7\x19\xd0N\xd1\xc4:\xb5\xae\x93\x8f\x8c\xe7H\x8d\xb2\x9c\xd1\x1f\xc6\xce\xb7\xb5(\x8dC$~\t0l\x91p\xba\xe8[\xb7U\a!\x11\x14M\x1f\xe0?X\v\xd6\xd8\xfa\xcc\xfe\xe8\xbe\xe4\xc6\xc5(]\xafVD6BR\xfd\x97P\xd7.D\xcf\xba\xc4\x91t\x80\x83\x95\'\xd9\x01\x80\xcd\xb7w\xc1\x17m3\xa7\xeah\xd1\x91\xac\x0e\xfc\xd7{Sw\xac-\x81\xa5\x1e\\\x10\xe2\xde\xb9\xe9j\"Fg-}m\x93H^1E\xf9\xc6*-/\xa0\x8b\xb8T\x16\xccR\x96i\x05}=\x13.\xae\xb0\xec\xb3\xc2\xacu\x96/\xe8\xc8\x0eP#\x86\xf3\x8eh\xe7\x9b\xee\x06\x9a\x81\xb0\xfam\xbd\xb0uA\x9d\x166\xd3p\x92j\x0e\xcbf\x14Q\x0fg\xbby\x1a\xb6\xb7t\xf76\xa3h\x04\\+\x9e\xb6\xbf\xacH\xd4\x1e\xb0\xdf\x8cqy\xd2,?\v\xf50\x9d\xb7\r\xc7O\x13\xf7b\xb8\xea\x16lQ\x04\v8\xf8W\xb7\xbcD\x14\xe1\xf1V\b\x82:Q[\x94^\xa3;a?H\xc9\xa75=\xb3\xc9*5\xfc\xa3\x15\x05\x8b>\'e~\xff\a\x00\x00\x00\x00\x00\x00\x80\xdb\b\x7f\x83\x11\'\x9e\xeb\xfa\xbeo\v\x86\xc7\x97\xa8\xef\x95\xfd\xe9G\x18t\xdbt\x81cW\x19\xe5A\x1a\x89\xf6]\xc1\xe8\x9c\x92`\x13\x9e\x1bNW\xba\x93\x1d\xc5\xfa\xb9g\x96\x82\x81f\xad\x06\r\xe4V\x1c\xe9n\xb8\xe9\xf7\xe0\x82\xe8\xa4E\xba\x93D\x9e\xf6\x16\xda$\x83\xdf\xdf\xa7\xb92y\\\xb8\x99\xe3i\xa3\xba\x0f\x85#C\x948\x89\x94\xd4\xaeS\xa4\x83x\xdc\x87\xb9)0\'x\xa4%{\x89\xe6W\x7f\x85\xa7\xd3\x16_\xae\xdd\xc3\x86\"\xe0\xae\xd5\xf2\xff\xc2W\a2\xf8\xa0\xb1\xb2J\xa7\x11o^\xd9\xa2\x89]\xcd\xbb\xb7\x15lC\b\x83\xba0\x9e@/\x80\\zJ\xd9)\x92\x1c\x88#:\xc8\xa0;\x98r\xd9(\x1c\x10\x9b\xe26\xc2\x00\x81\xf4!:C-m\x900\xce\x88\x00M\x86\xcbc\x86a\xd7\xf6\xc2Q\x12~\t\x01:\n\xff$\xf1\'\xe0\xa2E\xb8T<\xd5\xf7A\xafE\x9b\\p\xa7\xa7\x9e\xec\xc2%\xe6\x1e\x90\xa9\xca!\x9d.\xb3\xfc\xd9[\xbeBI\x97-+\xe3#\x8f\xbd\x89u\xe2}\xfa\x82\xe5\xdaSo_\xdd\x93g\x04\xf3R\x10Q\xc3,zfJ\xd6\x82*eS\xa2\x9b4TA\xbf\x8a./\xe0-\xd8\xf1\t\x18~\x1c\x82\xe4\xfa;\x9a&Mb37\xc0\xb1o\x05P\xe3\xfa:~\xf1s\xb9\xafH\xaeP\xa6\xbcl\xad\a\xdcK\xa1uO\xb5O\xfch\xc9\xd3\xb0\xf3\'\xa0E5\xb4M\rt\'\xb1\xd3\x1d\'\tF\xfbxddNpS\xee\x1e\x04J\xe0h\x96\x9eK\x1aF%\xc67\xd3\xc0\xd8\xa0*$0\x00\xd0\xea\xb5%\x91m7\xdf\xdcr\xcfWH\xde\xc0\t\x8a\t\x9f_\x82\xd8`\xa2Ed\xfbSp\x1cZ\x951\x9fN\x15\xc9\x06\xc7*\xda\xa9`\x1b\xc9\xec{\xfa\xa3k\xc1Q\xf3\xbf\xfdk\xdc\xd0\xaf\x93o\xe7C\x8a(\x1fb\xc7A\x91\xb6\xf71_M\xff\xb7L8\xf3H[\xdb\xf2\'S\xd2\xbf\x12#\xec\xf9d\xa2\xc9U\x03\x00\xcb3:\xbc\xe7\xa3\x7f\x8a\xc5\x8ev\x8d\xe5\xe36\x98[ j7\xf5\xbbsN\x1a\xec\x8c\xd4@\x0f\xed*}KI\x06hFm\xce{\xa4\xa2!\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\a\xecb^[k\x88%\x11\xdaJ\x82\x00t\xc9<3\x1dNe\"\xed~\xbf', 0x0) ftruncate(r0, 0xffffff) r1 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000580), 0x4) sendfile(r1, r0, 0x0, 0x1e3a) sendmsg$inet(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x0) D0307 22:52:14.740265 340720 task_exit.go:204] [ 33804: 33804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.740507 340720 task_exit.go:204] [ 33804: 33804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.740679 340720 task_signals.go:204] [ 33804: 33810] Signal 33804, PID: 33810, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.740782 340720 task_exit.go:204] [ 33804: 33810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.744880 340720 task_exit.go:204] [ 33804: 33810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.745051 340720 task_exit.go:204] [ 33804: 33810] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.745092 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.745169 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.745485 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.745589 340720 task_exit.go:204] [ 33804: 33804] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) D0307 22:52:14.757272 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.757584 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.760908 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.765289 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.771183 340720 usertrap_amd64.go:212] [ 33811: 33811] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.771301 340720 usertrap_amd64.go:122] [ 33811: 33811] Allocate a new trap: 0xc000433da0 40 D0307 22:52:14.771845 340720 usertrap_amd64.go:225] [ 33811: 33811] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.774180 340720 usertrap_amd64.go:212] [ 33811: 33811] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.774244 340720 usertrap_amd64.go:122] [ 33811: 33811] Allocate a new trap: 0xc000433da0 41 D0307 22:52:14.774294 340720 usertrap_amd64.go:225] [ 33811: 33811] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.774991 340720 usertrap_amd64.go:212] [ 33812: 33812] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.775158 340720 usertrap_amd64.go:122] [ 33812: 33812] Allocate a new trap: 0xc0002972c0 40 D0307 22:52:14.775947 340720 usertrap_amd64.go:225] [ 33812: 33812] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.779252 340720 usertrap_amd64.go:212] [ 33812: 33812] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.779341 340720 usertrap_amd64.go:122] [ 33812: 33812] Allocate a new trap: 0xc0002972c0 41 D0307 22:52:14.779482 340720 usertrap_amd64.go:225] [ 33812: 33812] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.782772 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.783259 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.790740 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.791158 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.803371 340720 usertrap_amd64.go:212] [ 33811: 33811] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.803497 340720 usertrap_amd64.go:122] [ 33811: 33811] Allocate a new trap: 0xc000433da0 42 D0307 22:52:14.803653 340720 usertrap_amd64.go:225] [ 33811: 33811] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:14.803863 340720 usertrap_amd64.go:212] [ 33813: 33813] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.804042 340720 usertrap_amd64.go:122] [ 33813: 33813] Allocate a new trap: 0xc00bf79e60 40 D0307 22:52:14.804681 340720 usertrap_amd64.go:225] [ 33813: 33813] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.807431 340720 usertrap_amd64.go:212] [ 33813: 33813] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.807484 340720 usertrap_amd64.go:122] [ 33813: 33813] Allocate a new trap: 0xc00bf79e60 41 D0307 22:52:14.807542 340720 usertrap_amd64.go:225] [ 33813: 33813] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:14.812993 340720 usertrap_amd64.go:212] [ 33814: 33814] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.813119 340720 usertrap_amd64.go:122] [ 33814: 33814] Allocate a new trap: 0xc009c1c540 39 D0307 22:52:14.813744 340720 usertrap_amd64.go:225] [ 33814: 33814] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.816751 340720 usertrap_amd64.go:212] [ 33812: 33812] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.816868 340720 usertrap_amd64.go:122] [ 33812: 33812] Allocate a new trap: 0xc0002972c0 42 D0307 22:52:14.817019 340720 usertrap_amd64.go:225] [ 33812: 33812] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.817313 340720 usertrap_amd64.go:212] [ 33814: 33814] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.817411 340720 usertrap_amd64.go:122] [ 33814: 33814] Allocate a new trap: 0xc009c1c540 40 D0307 22:52:14.817528 340720 usertrap_amd64.go:225] [ 33814: 33814] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.822776 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.823479 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.824018 340720 usertrap_amd64.go:212] [ 33811: 33811] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.824088 340720 usertrap_amd64.go:122] [ 33811: 33811] Allocate a new trap: 0xc000433da0 43 D0307 22:52:14.824153 340720 usertrap_amd64.go:225] [ 33811: 33811] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.826864 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.827733 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.830929 340720 task_exit.go:204] [ 33811: 33811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.831044 340720 task_signals.go:204] [ 33811: 33815] Signal 33811, PID: 33815, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.831194 340720 task_exit.go:204] [ 33811: 33815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.831621 340720 task_exit.go:204] [ 33811: 33815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.831667 340720 task_exit.go:204] [ 33811: 33815] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.833929 340720 usertrap_amd64.go:212] [ 33812: 33812] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.834012 340720 usertrap_amd64.go:122] [ 33812: 33812] Allocate a new trap: 0xc0002972c0 43 D0307 22:52:14.834115 340720 usertrap_amd64.go:225] [ 33812: 33812] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.838450 340720 task_exit.go:204] [ 33811: 33811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.838688 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.838946 340720 task_exit.go:204] [ 33811: 33811] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.839220 340720 task_exit.go:204] [ 33812: 33812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.839346 340720 task_signals.go:204] [ 33812: 33816] Signal 33812, PID: 33816, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.839487 340720 task_exit.go:204] [ 33812: 33816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.839754 340720 task_exit.go:204] [ 33812: 33812] Transitioning from exit state TaskExitInitiated to TaskExitZombie 22:52:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETATTR(r0, &(0x7f0000000600)={0xa0}, 0xa0) D0307 22:52:14.843078 340720 task_exit.go:204] [ 33812: 33816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.843159 340720 task_exit.go:204] [ 33812: 33816] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.843307 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.845888 340720 usertrap_amd64.go:212] [ 33814: 33814] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.845992 340720 usertrap_amd64.go:122] [ 33814: 33814] Allocate a new trap: 0xc009c1c540 41 D0307 22:52:14.846064 340720 usertrap_amd64.go:225] [ 33814: 33814] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.846327 340720 task_exit.go:204] [ 33812: 33812] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r0, &(0x7f0000004300)={0x2, 0x0, @dev}, 0x10) getpeername(r0, 0x0, &(0x7f0000000140)) D0307 22:52:14.856263 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.856894 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.857116 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.857459 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.861280 340720 usertrap_amd64.go:212] [ 33814: 33814] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.861367 340720 usertrap_amd64.go:122] [ 33814: 33814] Allocate a new trap: 0xc009c1c540 42 D0307 22:52:14.861451 340720 usertrap_amd64.go:225] [ 33814: 33814] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.861716 340720 usertrap_amd64.go:212] [ 33813: 33813] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:14.861873 340720 usertrap_amd64.go:122] [ 33813: 33813] Allocate a new trap: 0xc00bf79e60 42 D0307 22:52:14.861983 340720 usertrap_amd64.go:225] [ 33813: 33813] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:14.866652 340720 task_exit.go:204] [ 33814: 33814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.867223 340720 task_signals.go:204] [ 33814: 33817] Signal 33814, PID: 33817, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.867403 340720 task_exit.go:204] [ 33814: 33814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.867595 340720 task_exit.go:204] [ 33814: 33817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.871699 340720 task_exit.go:204] [ 33814: 33817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.871791 340720 task_exit.go:204] [ 33814: 33817] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.871871 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:14.873539 340720 task_exit.go:204] [ 33814: 33814] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) D0307 22:52:14.888337 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.888877 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.902169 340720 usertrap_amd64.go:212] [ 33820: 33820] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:14.902306 340720 usertrap_amd64.go:122] [ 33820: 33820] Allocate a new trap: 0xc002539350 40 D0307 22:52:14.903006 340720 usertrap_amd64.go:225] [ 33820: 33820] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:14.911373 340720 usertrap_amd64.go:212] [ 33820: 33820] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:14.911443 340720 usertrap_amd64.go:122] [ 33820: 33820] Allocate a new trap: 0xc002539350 41 D0307 22:52:14.911503 340720 usertrap_amd64.go:225] [ 33820: 33820] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:14.913594 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.913996 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.916410 340720 usertrap_amd64.go:212] [ 33813: 33813] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:14.916492 340720 usertrap_amd64.go:122] [ 33813: 33813] Allocate a new trap: 0xc00bf79e60 43 D0307 22:52:14.916560 340720 usertrap_amd64.go:225] [ 33813: 33813] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:14.918282 340720 usertrap_amd64.go:212] [ 33818: 33818] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:14.918376 340720 usertrap_amd64.go:122] [ 33818: 33818] Allocate a new trap: 0xc000297470 40 D0307 22:52:14.918896 340720 usertrap_amd64.go:225] [ 33818: 33818] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:14.919514 340720 task_exit.go:204] [ 33813: 33813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.919684 340720 task_signals.go:204] [ 33813: 33819] Signal 33813, PID: 33819, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.919779 340720 task_exit.go:204] [ 33813: 33819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.920210 340720 task_exit.go:204] [ 33813: 33813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.922075 340720 usertrap_amd64.go:212] [ 33818: 33818] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:14.922122 340720 usertrap_amd64.go:122] [ 33818: 33818] Allocate a new trap: 0xc000297470 41 D0307 22:52:14.922190 340720 usertrap_amd64.go:225] [ 33818: 33818] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:14.923132 340720 task_exit.go:204] [ 33813: 33819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.923197 340720 task_exit.go:204] [ 33813: 33819] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.923349 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:14.923476 340720 task_exit.go:204] [ 33813: 33813] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.926965 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.927381 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.932309 340720 usertrap_amd64.go:212] [ 33820: 33820] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:14.932380 340720 usertrap_amd64.go:122] [ 33820: 33820] Allocate a new trap: 0xc002539350 42 D0307 22:52:14.932463 340720 usertrap_amd64.go:225] [ 33820: 33820] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) 22:52:14 executing program 3: r0 = memfd_create(&(0x7f00000005c0)='/dev/\"\x00\x00\x00\x00\x00\x00\x00\xe8\x00\xeb\xdaz\x98\x00\xc8\x8d\x93\a\x8a\x8bYd>\x7f\xbek\x7fN\x1e\xdf\xf89_\xad\x8fv\x80\xab!S\xe8\xe1\x05.!N<\x8e\xe2sNL\\\xc0\xe7Z\x1av\xc0+X\x8d\xddx\xc6\xb6P\x1d\xfd\x90\x00\x00\x00\x04{\x1cB\xd5Feb\xd5\xb7V\x8dX\x10_p)\xba|7\xa4\xb8\xfb\xd62(\x92\\\xc3j\x870\xe5\x8c.\x955,`=\xdca\xda\x96)n\xe3\xa0\x03\xde\xd5\xfb\xb8\xdc\x18`\xd1S\x81\x88\xf9J~\x9d!\xbcw\xf6\xfb\xe3\xd1T\xd8\x9ft\x00\xd2\xaf\xeeZ\xbe\x89\n\x14\xa3\x83\x13i\xed\xe2\x92\xa8\x10\x80O\xaaw\xf7[\x7f\x16#\xe4\x9e\x86j\x9c\x8e\xbf\x12\xdc\x19$5zf\x98V\x1aj\xd3\xc42\x06\xab\x98{\xbd\xcb=\x92\xe1\xe33\xb2-\xfe\xbd\xc6\xbb\xc6\x85\xd1\x84\x0eD\x7f\x12\xf7\x19\xd0N\xd1\xc4:\xb5\xae\x93\x8f\x8c\xe7H\x8d\xb2\x9c\xd1\x1f\xc6\xce\xb7\xb5(\x8dC$~\t0l\x91p\xba\xe8[\xb7U\a!\x11\x14M\x1f\xe0?X\v\xd6\xd8\xfa\xcc\xfe\xe8\xbe\xe4\xc6\xc5(]\xafVD6BR\xfd\x97P\xd7.D\xcf\xba\xc4\x91t\x80\x83\x95\'\xd9\x01\x80\xcd\xb7w\xc1\x17m3\xa7\xeah\xd1\x91\xac\x0e\xfc\xd7{Sw\xac-\x81\xa5\x1e\\\x10\xe2\xde\xb9\xe9j\"Fg-}m\x93H^1E\xf9\xc6*-/\xa0\x8b\xb8T\x16\xccR\x96i\x05}=\x13.\xae\xb0\xec\xb3\xc2\xacu\x96/\xe8\xc8\x0eP#\x86\xf3\x8eh\xe7\x9b\xee\x06\x9a\x81\xb0\xfam\xbd\xb0uA\x9d\x166\xd3p\x92j\x0e\xcbf\x14Q\x0fg\xbby\x1a\xb6\xb7t\xf76\xa3h\x04\\+\x9e\xb6\xbf\xacH\xd4\x1e\xb0\xdf\x8cqy\xd2,?\v\xf50\x9d\xb7\r\xc7O\x13\xf7b\xb8\xea\x16lQ\x04\v8\xf8W\xb7\xbcD\x14\xe1\xf1V\b\x82:Q[\x94^\xa3;a?H\xc9\xa75=\xb3\xc9*5\xfc\xa3\x15\x05\x8b>\'e~\xff\a\x00\x00\x00\x00\x00\x00\x80\xdb\b\x7f\x83\x11\'\x9e\xeb\xfa\xbeo\v\x86\xc7\x97\xa8\xef\x95\xfd\xe9G\x18t\xdbt\x81cW\x19\xe5A\x1a\x89\xf6]\xc1\xe8\x9c\x92`\x13\x9e\x1bNW\xba\x93\x1d\xc5\xfa\xb9g\x96\x82\x81f\xad\x06\r\xe4V\x1c\xe9n\xb8\xe9\xf7\xe0\x82\xe8\xa4E\xba\x93D\x9e\xf6\x16\xda$\x83\xdf\xdf\xa7\xb92y\\\xb8\x99\xe3i\xa3\xba\x0f\x85#C\x948\x89\x94\xd4\xaeS\xa4\x83x\xdc\x87\xb9)0\'x\xa4%{\x89\xe6W\x7f\x85\xa7\xd3\x16_\xae\xdd\xc3\x86\"\xe0\xae\xd5\xf2\xff\xc2W\a2\xf8\xa0\xb1\xb2J\xa7\x11o^\xd9\xa2\x89]\xcd\xbb\xb7\x15lC\b\x83\xba0\x9e@/\x80\\zJ\xd9)\x92\x1c\x88#:\xc8\xa0;\x98r\xd9(\x1c\x10\x9b\xe26\xc2\x00\x81\xf4!:C-m\x900\xce\x88\x00M\x86\xcbc\x86a\xd7\xf6\xc2Q\x12~\t\x01:\n\xff$\xf1\'\xe0\xa2E\xb8T<\xd5\xf7A\xafE\x9b\\p\xa7\xa7\x9e\xec\xc2%\xe6\x1e\x90\xa9\xca!\x9d.\xb3\xfc\xd9[\xbeBI\x97-+\xe3#\x8f\xbd\x89u\xe2}\xfa\x82\xe5\xdaSo_\xdd\x93g\x04\xf3R\x10Q\xc3,zfJ\xd6\x82*eS\xa2\x9b4TA\xbf\x8a./\xe0-\xd8\xf1\t\x18~\x1c\x82\xe4\xfa;\x9a&Mb37\xc0\xb1o\x05P\xe3\xfa:~\xf1s\xb9\xafH\xaeP\xa6\xbcl\xad\a\xdcK\xa1uO\xb5O\xfch\xc9\xd3\xb0\xf3\'\xa0E5\xb4M\rt\'\xb1\xd3\x1d\'\tF\xfbxddNpS\xee\x1e\x04J\xe0h\x96\x9eK\x1aF%\xc67\xd3\xc0\xd8\xa0*$0\x00\xd0\xea\xb5%\x91m7\xdf\xdcr\xcfWH\xde\xc0\t\x8a\t\x9f_\x82\xd8`\xa2Ed\xfbSp\x1cZ\x951\x9fN\x15\xc9\x06\xc7*\xda\xa9`\x1b\xc9\xec{\xfa\xa3k\xc1Q\xf3\xbf\xfdk\xdc\xd0\xaf\x93o\xe7C\x8a(\x1fb\xc7A\x91\xb6\xf71_M\xff\xb7L8\xf3H[\xdb\xf2\'S\xd2\xbf\x12#\xec\xf9d\xa2\xc9U\x03\x00\xcb3:\xbc\xe7\xa3\x7f\x8a\xc5\x8ev\x8d\xe5\xe36\x98[ j7\xf5\xbbsN\x1a\xec\x8c\xd4@\x0f\xed*}KI\x06hFm\xce{\xa4\xa2!\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\a\xecb^[k\x88%\x11\xdaJ\x82\x00t\xc9<3\x1dNe\"\xed~\xbf', 0x0) ftruncate(r0, 0xffffff) r1 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000580), 0x4) sendfile(r1, r0, 0x0, 0x1e3a) sendmsg$inet(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x0) D0307 22:52:14.936896 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.937298 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.942271 340720 usertrap_amd64.go:212] [ 33821: 33821] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:14.942361 340720 usertrap_amd64.go:122] [ 33821: 33821] Allocate a new trap: 0xc009c1c750 39 D0307 22:52:14.942862 340720 usertrap_amd64.go:225] [ 33821: 33821] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:14.943039 340720 usertrap_amd64.go:212] [ 33818: 33818] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:14.943112 340720 usertrap_amd64.go:122] [ 33818: 33818] Allocate a new trap: 0xc000297470 42 D0307 22:52:14.943191 340720 usertrap_amd64.go:225] [ 33818: 33818] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:14.945355 340720 usertrap_amd64.go:212] [ 33821: 33821] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:14.945445 340720 usertrap_amd64.go:122] [ 33821: 33821] Allocate a new trap: 0xc009c1c750 40 D0307 22:52:14.945523 340720 usertrap_amd64.go:225] [ 33821: 33821] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:14.949312 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.949677 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.956841 340720 usertrap_amd64.go:212] [ 33820: 33820] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:14.956915 340720 usertrap_amd64.go:122] [ 33820: 33820] Allocate a new trap: 0xc002539350 43 D0307 22:52:14.957050 340720 usertrap_amd64.go:225] [ 33820: 33820] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:14.964424 340720 task_exit.go:204] [ 33820: 33820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.964659 340720 task_signals.go:204] [ 33820: 33822] Signal 33820, PID: 33822, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.964760 340720 task_exit.go:204] [ 33820: 33820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.964878 340720 task_exit.go:204] [ 33820: 33822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.969339 340720 task_exit.go:204] [ 33820: 33822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.969465 340720 task_exit.go:204] [ 33820: 33822] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.969534 340720 usertrap_amd64.go:212] [ 33821: 33821] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:14.969641 340720 usertrap_amd64.go:122] [ 33821: 33821] Allocate a new trap: 0xc009c1c750 41 D0307 22:52:14.969577 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:14.969833 340720 usertrap_amd64.go:225] [ 33821: 33821] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:14.969958 340720 task_exit.go:204] [ 33820: 33820] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETATTR(r0, &(0x7f0000000600)={0xa0}, 0xa0) D0307 22:52:14.976805 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:14.977234 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.979149 340720 usertrap_amd64.go:212] [ 33824: 33824] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:14.979267 340720 usertrap_amd64.go:122] [ 33824: 33824] Allocate a new trap: 0xc0002ee7e0 40 D0307 22:52:14.979819 340720 usertrap_amd64.go:225] [ 33824: 33824] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:14.982028 340720 usertrap_amd64.go:212] [ 33818: 33818] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:14.982110 340720 usertrap_amd64.go:122] [ 33818: 33818] Allocate a new trap: 0xc000297470 43 D0307 22:52:14.982301 340720 usertrap_amd64.go:225] [ 33818: 33818] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:14.983723 340720 usertrap_amd64.go:212] [ 33824: 33824] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:14.983816 340720 usertrap_amd64.go:122] [ 33824: 33824] Allocate a new trap: 0xc0002ee7e0 41 D0307 22:52:14.983883 340720 usertrap_amd64.go:225] [ 33824: 33824] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:14.985408 340720 task_exit.go:204] [ 33818: 33818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.985572 340720 task_signals.go:204] [ 33818: 33823] Signal 33818, PID: 33823, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.985688 340720 task_exit.go:204] [ 33818: 33823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.986381 340720 task_exit.go:204] [ 33818: 33823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.986476 340720 task_exit.go:204] [ 33818: 33823] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:14.987573 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:14.988077 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:14.991860 340720 task_exit.go:204] [ 33818: 33818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.992076 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:14.992239 340720 usertrap_amd64.go:212] [ 33821: 33821] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:14.992305 340720 usertrap_amd64.go:122] [ 33821: 33821] Allocate a new trap: 0xc009c1c750 42 D0307 22:52:14.992369 340720 usertrap_amd64.go:225] [ 33821: 33821] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:14.993313 340720 task_exit.go:204] [ 33818: 33818] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:14 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r0, &(0x7f0000004300)={0x2, 0x0, @dev}, 0x10) getpeername(r0, 0x0, &(0x7f0000000140)) D0307 22:52:14.998268 340720 task_exit.go:204] [ 33821: 33821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:14.998422 340720 task_signals.go:204] [ 33821: 33825] Signal 33821, PID: 33825, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:14.998444 340720 task_exit.go:204] [ 33821: 33821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:14.998824 340720 task_exit.go:204] [ 33821: 33825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.002185 340720 task_exit.go:204] [ 33821: 33825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.002242 340720 task_exit.go:204] [ 33821: 33825] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.002342 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:15.003773 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.004192 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.005137 340720 task_exit.go:204] [ 33821: 33821] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.010667 340720 usertrap_amd64.go:212] [ 33824: 33824] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.010764 340720 usertrap_amd64.go:122] [ 33824: 33824] Allocate a new trap: 0xc0002ee7e0 42 D0307 22:52:15.010823 340720 usertrap_amd64.go:225] [ 33824: 33824] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:15.015631 340720 usertrap_amd64.go:212] [ 33826: 33826] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.015811 340720 usertrap_amd64.go:122] [ 33826: 33826] Allocate a new trap: 0xc004f83c80 40 D0307 22:52:15.016451 340720 usertrap_amd64.go:225] [ 33826: 33826] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:15.021036 340720 usertrap_amd64.go:212] [ 33826: 33826] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.021139 340720 usertrap_amd64.go:122] [ 33826: 33826] Allocate a new trap: 0xc004f83c80 41 D0307 22:52:15.021246 340720 usertrap_amd64.go:225] [ 33826: 33826] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) 22:52:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5411, &(0x7f0000000000)={'batadv_slave_0\x00', {0x2, 0x0, @local}}) D0307 22:52:15.025056 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.025899 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.029303 340720 usertrap_amd64.go:212] [ 33828: 33828] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:15.029415 340720 usertrap_amd64.go:122] [ 33828: 33828] Allocate a new trap: 0xc002c037a0 40 D0307 22:52:15.029941 340720 usertrap_amd64.go:225] [ 33828: 33828] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:15.030637 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.031099 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.043659 340720 usertrap_amd64.go:212] [ 33828: 33828] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:15.043726 340720 usertrap_amd64.go:122] [ 33828: 33828] Allocate a new trap: 0xc002c037a0 41 D0307 22:52:15.043814 340720 usertrap_amd64.go:225] [ 33828: 33828] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:15.045408 340720 usertrap_amd64.go:212] [ 33824: 33824] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:15.045533 340720 usertrap_amd64.go:122] [ 33824: 33824] Allocate a new trap: 0xc0002ee7e0 43 D0307 22:52:15.045687 340720 usertrap_amd64.go:225] [ 33824: 33824] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:15.052660 340720 task_exit.go:204] [ 33824: 33824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.052971 340720 task_signals.go:204] [ 33824: 33827] Signal 33824, PID: 33827, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.053019 340720 task_exit.go:204] [ 33824: 33824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.053137 340720 task_exit.go:204] [ 33824: 33827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.053826 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.054598 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.056349 340720 usertrap_amd64.go:212] [ 33826: 33826] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.056465 340720 usertrap_amd64.go:122] [ 33826: 33826] Allocate a new trap: 0xc004f83c80 42 D0307 22:52:15.056569 340720 usertrap_amd64.go:225] [ 33826: 33826] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:15.065365 340720 task_exit.go:204] [ 33824: 33827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.065454 340720 task_exit.go:204] [ 33824: 33827] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.065589 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:15.067441 340720 task_exit.go:204] [ 33824: 33824] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.084506 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.085508 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RSTATu(r0, &(0x7f00000000c0)={0x58, 0x7d, 0x0, {{0x0, 0x43, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0x0, '', 0x8, 'bridge0\x00', 0x8, 'bridge0\x00'}, 0x0, '', 0xee01, 0x0, 0xee00}}, 0x58) D0307 22:52:15.097090 340720 usertrap_amd64.go:212] [ 33829: 33829] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:15.097927 340720 usertrap_amd64.go:122] [ 33829: 33829] Allocate a new trap: 0xc0025393e0 39 D0307 22:52:15.098461 340720 usertrap_amd64.go:225] [ 33829: 33829] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:15.101061 340720 usertrap_amd64.go:212] [ 33826: 33826] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:15.101178 340720 usertrap_amd64.go:122] [ 33826: 33826] Allocate a new trap: 0xc004f83c80 43 D0307 22:52:15.101277 340720 usertrap_amd64.go:225] [ 33826: 33826] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:15.105806 340720 task_exit.go:204] [ 33826: 33826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.106041 340720 task_exit.go:204] [ 33826: 33826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.107423 340720 task_signals.go:204] [ 33826: 33830] Signal 33826, PID: 33830, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.107512 340720 task_exit.go:204] [ 33826: 33830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.113298 340720 task_exit.go:204] [ 33826: 33830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.113368 340720 task_exit.go:204] [ 33826: 33830] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.113462 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:15.114759 340720 task_exit.go:204] [ 33826: 33826] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.115290 340720 usertrap_amd64.go:212] [ 33829: 33829] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:15.115388 340720 usertrap_amd64.go:122] [ 33829: 33829] Allocate a new trap: 0xc0025393e0 40 D0307 22:52:15.115540 340720 usertrap_amd64.go:225] [ 33829: 33829] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:15.119461 340720 usertrap_amd64.go:212] [ 33828: 33828] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:15.119512 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.119578 340720 usertrap_amd64.go:122] [ 33828: 33828] Allocate a new trap: 0xc002c037a0 42 D0307 22:52:15.119643 340720 usertrap_amd64.go:225] [ 33828: 33828] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:15.120103 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:15 executing program 1: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x0) D0307 22:52:15.123731 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.126275 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.136903 340720 usertrap_amd64.go:212] [ 33831: 33831] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:15.137055 340720 usertrap_amd64.go:122] [ 33831: 33831] Allocate a new trap: 0xc004f83d70 40 D0307 22:52:15.137606 340720 usertrap_amd64.go:225] [ 33831: 33831] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:15.139842 340720 usertrap_amd64.go:212] [ 33831: 33831] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:15.139910 340720 usertrap_amd64.go:122] [ 33831: 33831] Allocate a new trap: 0xc004f83d70 41 D0307 22:52:15.140012 340720 usertrap_amd64.go:225] [ 33831: 33831] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:15.140210 340720 usertrap_amd64.go:212] [ 33829: 33829] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:15.140331 340720 usertrap_amd64.go:122] [ 33829: 33829] Allocate a new trap: 0xc0025393e0 41 D0307 22:52:15.140450 340720 usertrap_amd64.go:225] [ 33829: 33829] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:15.142001 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.142355 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.144835 340720 usertrap_amd64.go:212] [ 33828: 33828] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:15.145057 340720 usertrap_amd64.go:122] [ 33828: 33828] Allocate a new trap: 0xc002c037a0 43 D0307 22:52:15.145157 340720 usertrap_amd64.go:225] [ 33828: 33828] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:15.148834 340720 task_exit.go:204] [ 33828: 33828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.149448 340720 task_signals.go:204] [ 33828: 33832] Signal 33828, PID: 33832, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.149731 340720 task_exit.go:204] [ 33828: 33832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.149954 340720 task_exit.go:204] [ 33828: 33828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.154389 340720 task_exit.go:204] [ 33828: 33832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.154457 340720 task_exit.go:204] [ 33828: 33832] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.154571 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.154695 340720 task_exit.go:204] [ 33828: 33828] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.158850 340720 usertrap_amd64.go:212] [ 33831: 33831] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.158947 340720 usertrap_amd64.go:122] [ 33831: 33831] Allocate a new trap: 0xc004f83d70 42 D0307 22:52:15.159032 340720 usertrap_amd64.go:225] [ 33831: 33831] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) 22:52:15 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r0, &(0x7f0000004300)={0x2, 0x0, @dev}, 0x10) getpeername(r0, 0x0, &(0x7f0000000140)) D0307 22:52:15.160837 340720 usertrap_amd64.go:212] [ 33833: 33833] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.160919 340720 usertrap_amd64.go:122] [ 33833: 33833] Allocate a new trap: 0xc002c037d0 40 D0307 22:52:15.161418 340720 usertrap_amd64.go:225] [ 33833: 33833] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:15.164347 340720 usertrap_amd64.go:212] [ 33833: 33833] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.164437 340720 usertrap_amd64.go:122] [ 33833: 33833] Allocate a new trap: 0xc002c037d0 41 D0307 22:52:15.164540 340720 usertrap_amd64.go:225] [ 33833: 33833] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:15.168562 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.169022 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.170408 340720 usertrap_amd64.go:212] [ 33829: 33829] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:15.170472 340720 usertrap_amd64.go:122] [ 33829: 33829] Allocate a new trap: 0xc0025393e0 42 D0307 22:52:15.170565 340720 usertrap_amd64.go:225] [ 33829: 33829] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:15.171542 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.172042 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.176931 340720 task_exit.go:204] [ 33829: 33829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.177235 340720 task_exit.go:204] [ 33829: 33829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.178008 340720 usertrap_amd64.go:212] [ 33831: 33831] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:15.178068 340720 usertrap_amd64.go:122] [ 33831: 33831] Allocate a new trap: 0xc004f83d70 43 D0307 22:52:15.178143 340720 usertrap_amd64.go:225] [ 33831: 33831] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:15.178337 340720 task_signals.go:204] [ 33829: 33834] Signal 33829, PID: 33834, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.178922 340720 task_exit.go:204] [ 33829: 33834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.184114 340720 task_exit.go:204] [ 33831: 33831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.185087 340720 task_exit.go:204] [ 33829: 33834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.185251 340720 task_exit.go:204] [ 33829: 33834] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.185384 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:15.185969 340720 task_signals.go:204] [ 33831: 33835] Signal 33831, PID: 33835, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.186346 340720 task_exit.go:204] [ 33831: 33835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.186544 340720 task_exit.go:204] [ 33829: 33829] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.186923 340720 task_exit.go:204] [ 33831: 33831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.189129 340720 usertrap_amd64.go:212] [ 33833: 33833] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.189223 340720 usertrap_amd64.go:122] [ 33833: 33833] Allocate a new trap: 0xc002c037d0 42 D0307 22:52:15.189304 340720 usertrap_amd64.go:225] [ 33833: 33833] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) 22:52:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5411, &(0x7f0000000000)={'batadv_slave_0\x00', {0x2, 0x0, @local}}) D0307 22:52:15.190822 340720 task_exit.go:204] [ 33831: 33835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.190925 340720 task_exit.go:204] [ 33831: 33835] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.191015 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:15.191415 340720 task_exit.go:204] [ 33831: 33831] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RSTATu(r0, &(0x7f00000000c0)={0x58, 0x7d, 0x0, {{0x0, 0x43, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0x0, '', 0x8, 'bridge0\x00', 0x8, 'bridge0\x00'}, 0x0, '', 0xee01, 0x0, 0xee00}}, 0x58) D0307 22:52:15.198674 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.199096 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.211199 340720 usertrap_amd64.go:212] [ 33833: 33833] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:15.211293 340720 usertrap_amd64.go:122] [ 33833: 33833] Allocate a new trap: 0xc002c037d0 43 D0307 22:52:15.211354 340720 usertrap_amd64.go:225] [ 33833: 33833] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:15.212716 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.213587 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.215335 340720 task_exit.go:204] [ 33833: 33833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.215591 340720 task_signals.go:204] [ 33833: 33837] Signal 33833, PID: 33837, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.216138 340720 task_exit.go:204] [ 33833: 33833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.217088 340720 task_exit.go:204] [ 33833: 33837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.221764 340720 task_exit.go:204] [ 33833: 33837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.221860 340720 task_exit.go:204] [ 33833: 33837] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.222004 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:15.222808 340720 task_exit.go:204] [ 33833: 33833] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:15 executing program 1: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x0) D0307 22:52:15.225436 340720 usertrap_amd64.go:212] [ 33836: 33836] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:15.225507 340720 usertrap_amd64.go:122] [ 33836: 33836] Allocate a new trap: 0xc002c03800 40 D0307 22:52:15.226494 340720 usertrap_amd64.go:225] [ 33836: 33836] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:15.231227 340720 usertrap_amd64.go:212] [ 33836: 33836] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:15.231300 340720 usertrap_amd64.go:122] [ 33836: 33836] Allocate a new trap: 0xc002c03800 41 D0307 22:52:15.231397 340720 usertrap_amd64.go:225] [ 33836: 33836] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:15.232498 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.233387 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.234322 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.234704 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.236495 340720 usertrap_amd64.go:212] [ 33838: 33838] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:15.236760 340720 usertrap_amd64.go:122] [ 33838: 33838] Allocate a new trap: 0xc00826c210 39 D0307 22:52:15.245571 340720 usertrap_amd64.go:225] [ 33838: 33838] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:15.246028 340720 usertrap_amd64.go:212] [ 33836: 33836] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:15.246156 340720 usertrap_amd64.go:122] [ 33836: 33836] Allocate a new trap: 0xc002c03800 42 D0307 22:52:15.246239 340720 usertrap_amd64.go:225] [ 33836: 33836] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:15.251765 340720 usertrap_amd64.go:212] [ 33838: 33838] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:15.251868 340720 usertrap_amd64.go:122] [ 33838: 33838] Allocate a new trap: 0xc00826c210 40 D0307 22:52:15.251957 340720 usertrap_amd64.go:225] [ 33838: 33838] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:15.255350 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.255845 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.258228 340720 usertrap_amd64.go:212] [ 33839: 33839] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:15.258376 340720 usertrap_amd64.go:122] [ 33839: 33839] Allocate a new trap: 0xc002c038f0 40 D0307 22:52:15.259046 340720 usertrap_amd64.go:225] [ 33839: 33839] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:15.262896 340720 usertrap_amd64.go:212] [ 33839: 33839] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:15.262961 340720 usertrap_amd64.go:122] [ 33839: 33839] Allocate a new trap: 0xc002c038f0 41 D0307 22:52:15.263050 340720 usertrap_amd64.go:225] [ 33839: 33839] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:15.268805 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.269148 340720 usertrap_amd64.go:212] [ 33836: 33836] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:15.269203 340720 usertrap_amd64.go:122] [ 33836: 33836] Allocate a new trap: 0xc002c03800 43 D0307 22:52:15.269253 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.269287 340720 usertrap_amd64.go:225] [ 33836: 33836] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:15.272672 340720 task_exit.go:204] [ 33836: 33836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.273134 340720 task_exit.go:204] [ 33836: 33836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.273297 340720 task_signals.go:204] [ 33836: 33841] Signal 33836, PID: 33841, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.273386 340720 task_exit.go:204] [ 33836: 33841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.277197 340720 usertrap_amd64.go:212] [ 33838: 33838] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:15.277271 340720 usertrap_amd64.go:122] [ 33838: 33838] Allocate a new trap: 0xc00826c210 41 D0307 22:52:15.277351 340720 usertrap_amd64.go:225] [ 33838: 33838] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:15.278539 340720 task_exit.go:204] [ 33836: 33841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.278610 340720 task_exit.go:204] [ 33836: 33841] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.278734 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.279053 340720 task_exit.go:204] [ 33836: 33836] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.279087 340720 usertrap_amd64.go:212] [ 33840: 33840] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.279232 340720 usertrap_amd64.go:122] [ 33840: 33840] Allocate a new trap: 0xc00826c240 40 D0307 22:52:15.281333 340720 usertrap_amd64.go:225] [ 33840: 33840] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) 22:52:15 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r0, &(0x7f0000004300)={0x2, 0x0, @dev}, 0x10) getpeername(r0, 0x0, &(0x7f0000000140)) D0307 22:52:15.283473 340720 usertrap_amd64.go:212] [ 33839: 33839] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.283529 340720 usertrap_amd64.go:122] [ 33839: 33839] Allocate a new trap: 0xc002c038f0 42 D0307 22:52:15.283600 340720 usertrap_amd64.go:225] [ 33839: 33839] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:15.283917 340720 usertrap_amd64.go:212] [ 33840: 33840] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.284013 340720 usertrap_amd64.go:122] [ 33840: 33840] Allocate a new trap: 0xc00826c240 41 D0307 22:52:15.284089 340720 usertrap_amd64.go:225] [ 33840: 33840] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:15.289362 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.289753 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.296403 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.297337 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.302212 340720 usertrap_amd64.go:212] [ 33840: 33840] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.302356 340720 usertrap_amd64.go:122] [ 33840: 33840] Allocate a new trap: 0xc00826c240 42 D0307 22:52:15.302482 340720 usertrap_amd64.go:225] [ 33840: 33840] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:15.302764 340720 usertrap_amd64.go:212] [ 33839: 33839] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:15.302523 340720 usertrap_amd64.go:212] [ 33838: 33838] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:15.302847 340720 usertrap_amd64.go:122] [ 33839: 33839] Allocate a new trap: 0xc002c038f0 43 D0307 22:52:15.302877 340720 usertrap_amd64.go:122] [ 33838: 33838] Allocate a new trap: 0xc00826c210 42 D0307 22:52:15.302936 340720 usertrap_amd64.go:225] [ 33839: 33839] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:15.303021 340720 usertrap_amd64.go:225] [ 33838: 33838] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:15.306665 340720 task_exit.go:204] [ 33839: 33839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.306969 340720 task_signals.go:204] [ 33839: 33843] Signal 33839, PID: 33843, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.307074 340720 task_exit.go:204] [ 33839: 33843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.307290 340720 task_exit.go:204] [ 33839: 33839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.311665 340720 task_exit.go:204] [ 33839: 33843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.311747 340720 task_exit.go:204] [ 33839: 33843] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.311844 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:15.312847 340720 task_exit.go:204] [ 33839: 33839] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.313552 340720 task_exit.go:204] [ 33838: 33838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.313909 340720 task_exit.go:204] [ 33838: 33838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.314129 340720 task_signals.go:204] [ 33838: 33842] Signal 33838, PID: 33842, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.314252 340720 task_exit.go:204] [ 33838: 33842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.318579 340720 task_exit.go:204] [ 33838: 33842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.318658 340720 task_exit.go:204] [ 33838: 33842] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.318789 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 22:52:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RSTATu(r0, &(0x7f00000000c0)={0x58, 0x7d, 0x0, {{0x0, 0x43, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0x0, '', 0x8, 'bridge0\x00', 0x8, 'bridge0\x00'}, 0x0, '', 0xee01, 0x0, 0xee00}}, 0x58) D0307 22:52:15.319834 340720 task_exit.go:204] [ 33838: 33838] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5411, &(0x7f0000000000)={'batadv_slave_0\x00', {0x2, 0x0, @local}}) D0307 22:52:15.327930 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.328909 340720 usertrap_amd64.go:212] [ 33840: 33840] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:15.329082 340720 usertrap_amd64.go:122] [ 33840: 33840] Allocate a new trap: 0xc00826c240 43 D0307 22:52:15.329145 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.329179 340720 usertrap_amd64.go:225] [ 33840: 33840] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:15.331926 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.332764 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.335634 340720 task_exit.go:204] [ 33840: 33840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.336124 340720 task_exit.go:204] [ 33840: 33840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.336238 340720 task_signals.go:204] [ 33840: 33844] Signal 33840, PID: 33844, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.336362 340720 task_exit.go:204] [ 33840: 33844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.342114 340720 task_exit.go:204] [ 33840: 33844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.342252 340720 task_exit.go:204] [ 33840: 33844] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.342356 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:15.342631 340720 task_exit.go:204] [ 33840: 33840] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.343819 340720 usertrap_amd64.go:212] [ 33845: 33845] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:15.344192 340720 usertrap_amd64.go:122] [ 33845: 33845] Allocate a new trap: 0xc003027f50 40 D0307 22:52:15.345761 340720 usertrap_amd64.go:225] [ 33845: 33845] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) 22:52:15 executing program 1: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x0) D0307 22:52:15.355675 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.359670 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.360383 340720 usertrap_amd64.go:212] [ 33845: 33845] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:15.360448 340720 usertrap_amd64.go:122] [ 33845: 33845] Allocate a new trap: 0xc003027f50 41 D0307 22:52:15.360516 340720 usertrap_amd64.go:225] [ 33845: 33845] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:15.368411 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.371146 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.385661 340720 usertrap_amd64.go:212] [ 33845: 33845] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:15.385824 340720 usertrap_amd64.go:122] [ 33845: 33845] Allocate a new trap: 0xc003027f50 42 D0307 22:52:15.385955 340720 usertrap_amd64.go:225] [ 33845: 33845] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:15.408332 340720 usertrap_amd64.go:212] [ 33846: 33846] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:15.408508 340720 usertrap_amd64.go:122] [ 33846: 33846] Allocate a new trap: 0xc0010542d0 39 D0307 22:52:15.409208 340720 usertrap_amd64.go:225] [ 33846: 33846] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:15.410115 340720 usertrap_amd64.go:212] [ 33847: 33847] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:15.410260 340720 usertrap_amd64.go:122] [ 33847: 33847] Allocate a new trap: 0xc004637bc0 40 D0307 22:52:15.410806 340720 usertrap_amd64.go:225] [ 33847: 33847] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:15.412611 340720 usertrap_amd64.go:212] [ 33846: 33846] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:15.412730 340720 usertrap_amd64.go:122] [ 33846: 33846] Allocate a new trap: 0xc0010542d0 40 D0307 22:52:15.412803 340720 usertrap_amd64.go:225] [ 33846: 33846] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:15.414722 340720 usertrap_amd64.go:212] [ 33847: 33847] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:15.414818 340720 usertrap_amd64.go:122] [ 33847: 33847] Allocate a new trap: 0xc004637bc0 41 D0307 22:52:15.414895 340720 usertrap_amd64.go:225] [ 33847: 33847] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:15.418500 340720 usertrap_amd64.go:212] [ 33848: 33848] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.418595 340720 usertrap_amd64.go:122] [ 33848: 33848] Allocate a new trap: 0xc001bb62d0 40 D0307 22:52:15.419184 340720 usertrap_amd64.go:225] [ 33848: 33848] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:15.420667 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.421815 340720 usertrap_amd64.go:212] [ 33848: 33848] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.421861 340720 usertrap_amd64.go:122] [ 33848: 33848] Allocate a new trap: 0xc001bb62d0 41 D0307 22:52:15.421974 340720 usertrap_amd64.go:225] [ 33848: 33848] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:15.422441 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.422804 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.423363 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.440185 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.440321 340720 usertrap_amd64.go:212] [ 33845: 33845] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:15.440418 340720 usertrap_amd64.go:122] [ 33845: 33845] Allocate a new trap: 0xc003027f50 43 D0307 22:52:15.440494 340720 usertrap_amd64.go:225] [ 33845: 33845] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:15.440761 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.445662 340720 usertrap_amd64.go:212] [ 33847: 33847] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.445761 340720 usertrap_amd64.go:122] [ 33847: 33847] Allocate a new trap: 0xc004637bc0 42 D0307 22:52:15.445910 340720 usertrap_amd64.go:225] [ 33847: 33847] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:15.446002 340720 task_exit.go:204] [ 33845: 33845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.446266 340720 task_exit.go:204] [ 33845: 33845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.446970 340720 task_signals.go:204] [ 33845: 33849] Signal 33845, PID: 33849, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.447265 340720 task_exit.go:204] [ 33845: 33849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.454852 340720 task_exit.go:204] [ 33845: 33849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.454946 340720 task_exit.go:204] [ 33845: 33849] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.455089 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.455273 340720 task_exit.go:204] [ 33845: 33845] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.460147 340720 usertrap_amd64.go:212] [ 33847: 33847] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:15.460304 340720 usertrap_amd64.go:122] [ 33847: 33847] Allocate a new trap: 0xc004637bc0 43 D0307 22:52:15.460385 340720 usertrap_amd64.go:225] [ 33847: 33847] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) 22:52:15 executing program 0: timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000002100)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7}, 0x7) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x2401, 0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) D0307 22:52:15.464535 340720 task_exit.go:204] [ 33847: 33847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.465155 340720 task_signals.go:204] [ 33847: 33850] Signal 33847, PID: 33850, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.465342 340720 task_exit.go:204] [ 33847: 33850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.465514 340720 task_exit.go:204] [ 33847: 33847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.467204 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.469149 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.471829 340720 task_exit.go:204] [ 33847: 33850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.471949 340720 task_exit.go:204] [ 33847: 33850] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.472071 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:15.473097 340720 task_exit.go:204] [ 33847: 33847] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.474328 340720 usertrap_amd64.go:212] [ 33846: 33846] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:15.474393 340720 usertrap_amd64.go:122] [ 33846: 33846] Allocate a new trap: 0xc0010542d0 41 D0307 22:52:15.474449 340720 usertrap_amd64.go:225] [ 33846: 33846] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) 22:52:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RSTATu(r0, &(0x7f00000000c0)={0x58, 0x7d, 0x0, {{0x0, 0x43, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0x0, '', 0x8, 'bridge0\x00', 0x8, 'bridge0\x00'}, 0x0, '', 0xee01, 0x0, 0xee00}}, 0x58) D0307 22:52:15.499434 340720 usertrap_amd64.go:212] [ 33848: 33848] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.499576 340720 usertrap_amd64.go:122] [ 33848: 33848] Allocate a new trap: 0xc001bb62d0 42 D0307 22:52:15.499649 340720 usertrap_amd64.go:225] [ 33848: 33848] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:15.518751 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.519266 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.530288 340720 usertrap_amd64.go:212] [ 33848: 33848] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:15.530400 340720 usertrap_amd64.go:122] [ 33848: 33848] Allocate a new trap: 0xc001bb62d0 43 D0307 22:52:15.530523 340720 usertrap_amd64.go:225] [ 33848: 33848] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:15.549960 340720 usertrap_amd64.go:212] [ 33853: 33853] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:15.550134 340720 usertrap_amd64.go:122] [ 33853: 33853] Allocate a new trap: 0xc001bb6540 40 D0307 22:52:15.550880 340720 usertrap_amd64.go:225] [ 33853: 33853] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:15.553416 340720 task_exit.go:204] [ 33848: 33848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.553839 340720 usertrap_amd64.go:212] [ 33853: 33853] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:15.553861 340720 task_signals.go:204] [ 33848: 33852] Signal 33848, PID: 33852, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.553941 340720 usertrap_amd64.go:122] [ 33853: 33853] Allocate a new trap: 0xc001bb6540 41 D0307 22:52:15.554043 340720 usertrap_amd64.go:225] [ 33853: 33853] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:15.554895 340720 task_exit.go:204] [ 33848: 33848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.555695 340720 task_exit.go:204] [ 33848: 33852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.557182 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.558149 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.559538 340720 task_exit.go:204] [ 33848: 33852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.559605 340720 task_exit.go:204] [ 33848: 33852] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.559698 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:15.560515 340720 task_exit.go:204] [ 33848: 33848] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.561288 340720 usertrap_amd64.go:212] [ 33846: 33846] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:15.561389 340720 usertrap_amd64.go:122] [ 33846: 33846] Allocate a new trap: 0xc0010542d0 42 D0307 22:52:15.561492 340720 usertrap_amd64.go:225] [ 33846: 33846] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) 22:52:15 executing program 1: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x0) D0307 22:52:15.571729 340720 task_exit.go:204] [ 33846: 33846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.572030 340720 task_signals.go:204] [ 33846: 33851] Signal 33846, PID: 33851, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.572194 340720 task_exit.go:204] [ 33846: 33846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.572479 340720 task_exit.go:204] [ 33846: 33851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.574468 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.576427 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.576523 340720 task_exit.go:204] [ 33846: 33851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.576606 340720 task_exit.go:204] [ 33846: 33851] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.576746 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:15.577790 340720 task_exit.go:204] [ 33846: 33846] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5411, &(0x7f0000000000)={'batadv_slave_0\x00', {0x2, 0x0, @local}}) D0307 22:52:15.586878 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.587368 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.595040 340720 usertrap_amd64.go:212] [ 33853: 33853] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:15.595122 340720 usertrap_amd64.go:122] [ 33853: 33853] Allocate a new trap: 0xc001bb6540 42 D0307 22:52:15.595243 340720 usertrap_amd64.go:225] [ 33853: 33853] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:15.601993 340720 usertrap_amd64.go:212] [ 33854: 33854] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:15.602808 340720 usertrap_amd64.go:122] [ 33854: 33854] Allocate a new trap: 0xc004f82000 40 D0307 22:52:15.607984 340720 usertrap_amd64.go:212] [ 33855: 33855] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.608099 340720 usertrap_amd64.go:122] [ 33855: 33855] Allocate a new trap: 0xc0002ee090 40 D0307 22:52:15.608909 340720 usertrap_amd64.go:225] [ 33855: 33855] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:15.608970 340720 usertrap_amd64.go:225] [ 33854: 33854] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:15.611220 340720 usertrap_amd64.go:212] [ 33855: 33855] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.611271 340720 usertrap_amd64.go:122] [ 33855: 33855] Allocate a new trap: 0xc0002ee090 41 D0307 22:52:15.611293 340720 usertrap_amd64.go:212] [ 33854: 33854] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:15.611317 340720 usertrap_amd64.go:225] [ 33855: 33855] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:15.611344 340720 usertrap_amd64.go:122] [ 33854: 33854] Allocate a new trap: 0xc004f82000 41 D0307 22:52:15.611409 340720 usertrap_amd64.go:225] [ 33854: 33854] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:15.616790 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.617308 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.629642 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.630350 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.639050 340720 usertrap_amd64.go:212] [ 33857: 33857] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:15.639295 340720 usertrap_amd64.go:122] [ 33857: 33857] Allocate a new trap: 0xc0002ee0c0 39 D0307 22:52:15.639852 340720 usertrap_amd64.go:225] [ 33857: 33857] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:15.644715 340720 usertrap_amd64.go:212] [ 33855: 33855] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.644856 340720 usertrap_amd64.go:122] [ 33855: 33855] Allocate a new trap: 0xc0002ee090 42 D0307 22:52:15.644932 340720 usertrap_amd64.go:225] [ 33855: 33855] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:15.651471 340720 usertrap_amd64.go:212] [ 33854: 33854] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.651604 340720 usertrap_amd64.go:122] [ 33854: 33854] Allocate a new trap: 0xc004f82000 42 D0307 22:52:15.651707 340720 usertrap_amd64.go:225] [ 33854: 33854] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:15.662073 340720 usertrap_amd64.go:212] [ 33857: 33857] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:15.662156 340720 usertrap_amd64.go:122] [ 33857: 33857] Allocate a new trap: 0xc0002ee0c0 40 D0307 22:52:15.662234 340720 usertrap_amd64.go:225] [ 33857: 33857] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:15.669419 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.669821 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.670971 340720 usertrap_amd64.go:212] [ 33854: 33854] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:15.671094 340720 usertrap_amd64.go:122] [ 33854: 33854] Allocate a new trap: 0xc004f82000 43 D0307 22:52:15.671199 340720 usertrap_amd64.go:225] [ 33854: 33854] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:15.680317 340720 usertrap_amd64.go:212] [ 33855: 33855] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:15.680396 340720 usertrap_amd64.go:122] [ 33855: 33855] Allocate a new trap: 0xc0002ee090 43 D0307 22:52:15.680322 340720 task_exit.go:204] [ 33854: 33854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.680505 340720 usertrap_amd64.go:225] [ 33855: 33855] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:15.680675 340720 task_exit.go:204] [ 33854: 33854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.680663 340720 task_signals.go:204] [ 33854: 33859] Signal 33854, PID: 33859, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.680889 340720 task_exit.go:204] [ 33854: 33859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.684178 340720 task_exit.go:204] [ 33855: 33855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.684320 340720 task_signals.go:204] [ 33855: 33858] Signal 33855, PID: 33858, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.684600 340720 task_exit.go:204] [ 33855: 33858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.685448 340720 task_exit.go:204] [ 33855: 33855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.685864 340720 task_exit.go:204] [ 33854: 33859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.685948 340720 task_exit.go:204] [ 33854: 33859] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.686053 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:15.686281 340720 task_exit.go:204] [ 33854: 33854] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.689708 340720 task_exit.go:204] [ 33855: 33858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.689896 340720 task_exit.go:204] [ 33855: 33858] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.690088 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:15.691104 340720 task_exit.go:204] [ 33855: 33855] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.692390 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 22:52:15 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0x8901, &(0x7f0000000300)) 22:52:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) D0307 22:52:15.702857 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.703582 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.704048 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.707891 340720 usertrap_amd64.go:212] [ 33857: 33857] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:15.707983 340720 usertrap_amd64.go:122] [ 33857: 33857] Allocate a new trap: 0xc0002ee0c0 41 D0307 22:52:15.709301 340720 usertrap_amd64.go:225] [ 33857: 33857] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:15.711292 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.711768 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.712761 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.723897 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.733173 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.742962 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.752846 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.758214 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.758918 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.761451 340720 usertrap_amd64.go:212] [ 33853: 33853] Found the pattern at ip 55def6d7ce1a:sysno 230 D0307 22:52:15.761555 340720 usertrap_amd64.go:122] [ 33853: 33853] Allocate a new trap: 0xc001bb6540 43 D0307 22:52:15.761683 340720 usertrap_amd64.go:225] [ 33853: 33853] Apply the binary patch addr 55def6d7ce1a trap addr 69d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:15.761947 340720 usertrap_amd64.go:212] [ 33863: 33863] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:15.762079 340720 usertrap_amd64.go:122] [ 33863: 33863] Allocate a new trap: 0xc0033fc300 40 D0307 22:52:15.762830 340720 usertrap_amd64.go:225] [ 33863: 33863] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:15.763385 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.765731 340720 usertrap_amd64.go:212] [ 33862: 33862] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.765852 340720 usertrap_amd64.go:122] [ 33862: 33862] Allocate a new trap: 0xc004636240 40 D0307 22:52:15.766378 340720 usertrap_amd64.go:225] [ 33862: 33862] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:15.767253 340720 usertrap_amd64.go:212] [ 33863: 33863] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:15.767339 340720 usertrap_amd64.go:122] [ 33863: 33863] Allocate a new trap: 0xc0033fc300 41 D0307 22:52:15.767411 340720 usertrap_amd64.go:225] [ 33863: 33863] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:15.769293 340720 usertrap_amd64.go:212] [ 33862: 33862] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.769390 340720 usertrap_amd64.go:122] [ 33862: 33862] Allocate a new trap: 0xc004636240 41 D0307 22:52:15.769481 340720 usertrap_amd64.go:225] [ 33862: 33862] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:15.774876 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.775234 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.776264 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.782580 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.785535 340720 usertrap_amd64.go:212] [ 33857: 33857] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:15.785681 340720 usertrap_amd64.go:122] [ 33857: 33857] Allocate a new trap: 0xc0002ee0c0 42 D0307 22:52:15.785763 340720 usertrap_amd64.go:225] [ 33857: 33857] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:15.787259 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.788538 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.789934 340720 task_signals.go:470] [ 33853: 33853] Notified of signal 20 D0307 22:52:15.790189 340720 task_signals.go:808] [ 33853: 33853] Signal 20: stopping 4 threads in thread group D0307 22:52:15.790338 340720 task_signals.go:885] [ 33853: 33856] Completing group stop D0307 22:52:15.790336 340720 task_exit.go:204] [ 33857: 33857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.790516 340720 task_stop.go:118] [ 33853: 33856] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.790615 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.790717 340720 task_stop.go:118] [ 33853: 33860] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.790758 340720 task_signals.go:204] [ 33857: 33861] Signal 33857, PID: 33861, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.790822 340720 task_stop.go:118] [ 33853: 33853] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.791075 340720 task_stop.go:118] [ 33853: 33864] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.791293 340720 task_exit.go:204] [ 33857: 33857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.791677 340720 task_exit.go:204] [ 33857: 33861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.793455 340720 task_signals.go:828] [ 33853: 33853] Ending complete group stop with 0 threads pending D0307 22:52:15.793552 340720 task_stop.go:138] [ 33853: 33853] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.793665 340720 task_stop.go:138] [ 33853: 33856] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.793718 340720 task_stop.go:138] [ 33853: 33860] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.793766 340720 task_stop.go:138] [ 33853: 33864] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.793808 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.794122 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.794157 340720 task_run.go:182] [ 33853: 33860] Restarting syscall 1: not interrupted by handled signal D0307 22:52:15.794308 340720 task_run.go:182] [ 33853: 33864] Restarting syscall 202: not interrupted by handled signal D0307 22:52:15.798177 340720 task_exit.go:204] [ 33857: 33861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.798262 340720 task_exit.go:204] [ 33857: 33861] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.798378 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:15.798578 340720 task_exit.go:204] [ 33857: 33857] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.800278 340720 task_signals.go:470] [ 33853: 33853] Notified of signal 20 D0307 22:52:15.800741 340720 task_signals.go:808] [ 33853: 33853] Signal 20: stopping 4 threads in thread group D0307 22:52:15.800996 340720 task_stop.go:118] [ 33853: 33864] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.801147 340720 task_stop.go:118] [ 33853: 33856] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.801325 340720 task_stop.go:118] [ 33853: 33853] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.803020 340720 task_signals.go:828] [ 33853: 33853] Ending incomplete group stop with 1 threads pending D0307 22:52:15.803098 340720 task_stop.go:138] [ 33853: 33853] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.803203 340720 task_stop.go:138] [ 33853: 33856] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.803266 340720 usertrap_amd64.go:212] [ 33862: 33862] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.803250 340720 task_stop.go:138] [ 33853: 33864] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.803341 340720 usertrap_amd64.go:122] [ 33862: 33862] Allocate a new trap: 0xc004636240 42 D0307 22:52:15.803374 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.803424 340720 usertrap_amd64.go:225] [ 33862: 33862] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:15.803519 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.803611 340720 task_run.go:182] [ 33853: 33864] Restarting syscall 202: not interrupted by handled signal D0307 22:52:15.803732 340720 task_run.go:179] [ 33853: 33853] Restarting syscall 230 with restart block: not interrupted by handled signal D0307 22:52:15.803876 340720 task_run.go:182] [ 33853: 33856] Restarting syscall 202: not interrupted by handled signal D0307 22:52:15.803947 340720 usertrap_amd64.go:212] [ 33863: 33863] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.804036 340720 usertrap_amd64.go:122] [ 33863: 33863] Allocate a new trap: 0xc0033fc300 42 D0307 22:52:15.804147 340720 usertrap_amd64.go:225] [ 33863: 33863] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) 22:52:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r0, 0x0, 0x0) D0307 22:52:15.809947 340720 usertrap_amd64.go:212] [ 33853: 33853] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:15.810130 340720 usertrap_amd64.go:122] [ 33853: 33853] Allocate a new trap: 0xc001bb6540 44 D0307 22:52:15.810327 340720 task_signals.go:470] [ 33853: 33853] Notified of signal 20 D0307 22:52:15.810341 340720 usertrap_amd64.go:225] [ 33853: 33853] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:15.811713 340720 task_signals.go:808] [ 33853: 33853] Signal 20: stopping 4 threads in thread group D0307 22:52:15.811907 340720 task_signals.go:885] [ 33853: 33860] Completing group stop D0307 22:52:15.812044 340720 task_stop.go:118] [ 33853: 33860] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.812214 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.812299 340720 task_stop.go:118] [ 33853: 33853] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.812366 340720 task_stop.go:118] [ 33853: 33856] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.812468 340720 task_stop.go:118] [ 33853: 33864] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:15.813039 340720 task_signals.go:828] [ 33853: 33853] Ending complete group stop with 0 threads pending D0307 22:52:15.813083 340720 task_stop.go:138] [ 33853: 33853] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.813156 340720 task_stop.go:138] [ 33853: 33856] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.813243 340720 task_stop.go:138] [ 33853: 33860] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.813306 340720 task_stop.go:138] [ 33853: 33864] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:15.813376 340720 task_signals.go:443] [ 33853: 33853] Discarding ignored signal 18 D0307 22:52:15.813608 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.813666 340720 task_run.go:182] [ 33853: 33860] Restarting syscall 202: not interrupted by handled signal D0307 22:52:15.813864 340720 task_run.go:182] [ 33853: 33856] Restarting syscall 202: not interrupted by handled signal D0307 22:52:15.813900 340720 task_run.go:182] [ 33853: 33864] Restarting syscall 202: not interrupted by handled signal D0307 22:52:15.815510 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.816013 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.817991 340720 task_exit.go:204] [ 33853: 33853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.818363 340720 task_signals.go:204] [ 33853: 33860] Signal 33853, PID: 33860, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.818359 340720 task_signals.go:204] [ 33853: 33864] Signal 33853, PID: 33864, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.818375 340720 task_signals.go:204] [ 33853: 33856] Signal 33853, PID: 33856, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.818541 340720 task_exit.go:204] [ 33853: 33860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.818721 340720 task_exit.go:204] [ 33853: 33853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.819200 340720 task_exit.go:204] [ 33853: 33860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.819295 340720 task_exit.go:204] [ 33853: 33860] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.819528 340720 task_exit.go:204] [ 33853: 33864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.819734 340720 task_exit.go:204] [ 33853: 33856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.820227 340720 task_signals.go:481] [ 33853: 33853] No task notified of signal 20 D0307 22:52:15.820475 340720 task_exit.go:204] [ 33853: 33864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.820563 340720 task_exit.go:204] [ 33853: 33864] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.822950 340720 task_signals.go:481] [ 33853: 33853] No task notified of signal 18 D0307 22:52:15.825136 340720 task_exit.go:204] [ 33853: 33856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.825226 340720 task_exit.go:204] [ 33853: 33856] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.825544 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:15.826071 340720 task_exit.go:204] [ 33853: 33853] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.827489 340720 usertrap_amd64.go:212] [ 33862: 33862] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:15.827583 340720 usertrap_amd64.go:122] [ 33862: 33862] Allocate a new trap: 0xc004636240 43 D0307 22:52:15.827744 340720 usertrap_amd64.go:225] [ 33862: 33862] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:15.829380 340720 usertrap_amd64.go:212] [ 33863: 33863] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:15.829532 340720 usertrap_amd64.go:122] [ 33863: 33863] Allocate a new trap: 0xc0033fc300 43 D0307 22:52:15.829620 340720 usertrap_amd64.go:225] [ 33863: 33863] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) 22:52:15 executing program 0: timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000002100)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7}, 0x7) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x2401, 0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) D0307 22:52:15.837755 340720 task_exit.go:204] [ 33863: 33863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.838136 340720 task_exit.go:204] [ 33863: 33863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.838101 340720 task_signals.go:204] [ 33863: 33866] Signal 33863, PID: 33866, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.839831 340720 task_exit.go:204] [ 33863: 33866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.843341 340720 task_exit.go:204] [ 33863: 33866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.843448 340720 task_exit.go:204] [ 33863: 33866] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.843569 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:15.843767 340720 task_exit.go:204] [ 33862: 33862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.843992 340720 task_exit.go:204] [ 33863: 33863] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.844297 340720 task_exit.go:204] [ 33862: 33862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.843924 340720 task_signals.go:204] [ 33862: 33865] Signal 33862, PID: 33865, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.845044 340720 task_exit.go:204] [ 33862: 33865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.847080 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.847508 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.848191 340720 task_exit.go:204] [ 33862: 33865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.848269 340720 task_exit.go:204] [ 33862: 33865] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.849765 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:15.849889 340720 task_exit.go:204] [ 33862: 33862] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:15 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0x8901, &(0x7f0000000300)) 22:52:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) D0307 22:52:15.860380 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.861300 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.872017 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.872427 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.881791 340720 usertrap_amd64.go:212] [ 33867: 33867] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:15.881895 340720 usertrap_amd64.go:122] [ 33867: 33867] Allocate a new trap: 0xc000296000 39 D0307 22:52:15.883341 340720 usertrap_amd64.go:225] [ 33867: 33867] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:15.896107 340720 usertrap_amd64.go:212] [ 33867: 33867] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:15.896242 340720 usertrap_amd64.go:122] [ 33867: 33867] Allocate a new trap: 0xc000296000 40 D0307 22:52:15.896344 340720 usertrap_amd64.go:225] [ 33867: 33867] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:15.901207 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.901704 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.902699 340720 usertrap_amd64.go:212] [ 33868: 33868] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:15.902791 340720 usertrap_amd64.go:122] [ 33868: 33868] Allocate a new trap: 0xc002c02120 40 D0307 22:52:15.905504 340720 usertrap_amd64.go:225] [ 33868: 33868] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:15.913823 340720 usertrap_amd64.go:212] [ 33869: 33869] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:15.914000 340720 usertrap_amd64.go:122] [ 33869: 33869] Allocate a new trap: 0xc002c02150 40 D0307 22:52:15.914784 340720 usertrap_amd64.go:225] [ 33869: 33869] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:15.916490 340720 usertrap_amd64.go:212] [ 33867: 33867] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:15.916581 340720 usertrap_amd64.go:122] [ 33867: 33867] Allocate a new trap: 0xc000296000 41 D0307 22:52:15.916637 340720 usertrap_amd64.go:212] [ 33868: 33868] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:15.916674 340720 usertrap_amd64.go:225] [ 33867: 33867] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:15.916725 340720 usertrap_amd64.go:122] [ 33868: 33868] Allocate a new trap: 0xc002c02120 41 D0307 22:52:15.916824 340720 usertrap_amd64.go:225] [ 33868: 33868] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:15.923268 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.924165 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.929611 340720 usertrap_amd64.go:212] [ 33869: 33869] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:15.929729 340720 usertrap_amd64.go:122] [ 33869: 33869] Allocate a new trap: 0xc002c02150 41 D0307 22:52:15.929808 340720 usertrap_amd64.go:225] [ 33869: 33869] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:15.936156 340720 usertrap_amd64.go:212] [ 33870: 33870] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:15.936265 340720 usertrap_amd64.go:122] [ 33870: 33870] Allocate a new trap: 0xc0033fc5a0 40 D0307 22:52:15.937456 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.941727 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.942318 340720 usertrap_amd64.go:225] [ 33870: 33870] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:15.950796 340720 usertrap_amd64.go:212] [ 33868: 33868] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:15.950861 340720 usertrap_amd64.go:212] [ 33870: 33870] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:15.950939 340720 usertrap_amd64.go:122] [ 33868: 33868] Allocate a new trap: 0xc002c02120 42 D0307 22:52:15.950962 340720 usertrap_amd64.go:122] [ 33870: 33870] Allocate a new trap: 0xc0033fc5a0 41 D0307 22:52:15.951051 340720 usertrap_amd64.go:225] [ 33868: 33868] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:15.951069 340720 usertrap_amd64.go:225] [ 33870: 33870] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:15.954448 340720 usertrap_amd64.go:212] [ 33867: 33867] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:15.954514 340720 usertrap_amd64.go:122] [ 33867: 33867] Allocate a new trap: 0xc000296000 42 D0307 22:52:15.954584 340720 usertrap_amd64.go:225] [ 33867: 33867] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:15.955043 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:15.955889 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:15.961491 340720 task_exit.go:204] [ 33867: 33867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.961856 340720 task_signals.go:204] [ 33867: 33871] Signal 33867, PID: 33871, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:15.961950 340720 task_exit.go:204] [ 33867: 33867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.962169 340720 task_exit.go:204] [ 33867: 33871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:15.967189 340720 task_exit.go:204] [ 33867: 33871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:15.967282 340720 task_exit.go:204] [ 33867: 33871] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:15.967380 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:15.967539 340720 task_exit.go:204] [ 33867: 33867] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r0, 0x0, 0x0) D0307 22:52:15.979582 340720 usertrap_amd64.go:212] [ 33870: 33870] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:15.979687 340720 usertrap_amd64.go:122] [ 33870: 33870] Allocate a new trap: 0xc0033fc5a0 42 D0307 22:52:15.979794 340720 usertrap_amd64.go:225] [ 33870: 33870] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:15.984705 340720 usertrap_amd64.go:212] [ 33869: 33869] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:15.984851 340720 usertrap_amd64.go:122] [ 33869: 33869] Allocate a new trap: 0xc002c02150 42 D0307 22:52:15.984924 340720 usertrap_amd64.go:225] [ 33869: 33869] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:15.989051 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:15.989573 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.001806 340720 usertrap_amd64.go:212] [ 33870: 33870] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.001916 340720 usertrap_amd64.go:122] [ 33870: 33870] Allocate a new trap: 0xc0033fc5a0 43 D0307 22:52:16.002007 340720 usertrap_amd64.go:225] [ 33870: 33870] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.003616 340720 usertrap_amd64.go:212] [ 33869: 33869] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.003712 340720 usertrap_amd64.go:122] [ 33869: 33869] Allocate a new trap: 0xc002c02150 43 D0307 22:52:16.003793 340720 usertrap_amd64.go:225] [ 33869: 33869] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.009904 340720 task_signals.go:204] [ 33870: 33873] Signal 33870, PID: 33873, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.010073 340720 task_exit.go:204] [ 33870: 33873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.010389 340720 task_exit.go:204] [ 33870: 33873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.010456 340720 task_exit.go:204] [ 33870: 33873] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.010644 340720 task_exit.go:204] [ 33870: 33870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.016056 340720 task_exit.go:204] [ 33870: 33870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.016235 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.018716 340720 task_exit.go:204] [ 33870: 33870] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) D0307 22:52:16.027502 340720 task_exit.go:204] [ 33869: 33869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.028254 340720 task_signals.go:204] [ 33869: 33874] Signal 33869, PID: 33874, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.028645 340720 task_exit.go:204] [ 33869: 33874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.028647 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.028887 340720 task_exit.go:204] [ 33869: 33869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.029249 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.034036 340720 task_exit.go:204] [ 33869: 33874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.034104 340720 task_exit.go:204] [ 33869: 33874] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.034220 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.034782 340720 task_exit.go:204] [ 33869: 33869] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0x8901, &(0x7f0000000300)) D0307 22:52:16.041393 340720 usertrap_amd64.go:212] [ 33875: 33875] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.041504 340720 usertrap_amd64.go:122] [ 33875: 33875] Allocate a new trap: 0xc0002ee570 39 D0307 22:52:16.042269 340720 usertrap_amd64.go:225] [ 33875: 33875] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:16.043851 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.049685 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.049800 340720 usertrap_amd64.go:212] [ 33875: 33875] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:16.049891 340720 usertrap_amd64.go:122] [ 33875: 33875] Allocate a new trap: 0xc0002ee570 40 D0307 22:52:16.049976 340720 usertrap_amd64.go:225] [ 33875: 33875] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:16.050199 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.054997 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.061486 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.061920 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.064200 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.071586 340720 usertrap_amd64.go:212] [ 33877: 33877] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:16.071692 340720 usertrap_amd64.go:122] [ 33877: 33877] Allocate a new trap: 0xc0030263f0 40 D0307 22:52:16.072316 340720 usertrap_amd64.go:225] [ 33877: 33877] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:16.074948 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.076233 340720 usertrap_amd64.go:212] [ 33875: 33875] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:16.076314 340720 usertrap_amd64.go:122] [ 33875: 33875] Allocate a new trap: 0xc0002ee570 41 D0307 22:52:16.076373 340720 usertrap_amd64.go:225] [ 33875: 33875] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:16.080286 340720 usertrap_amd64.go:212] [ 33877: 33877] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:16.080356 340720 usertrap_amd64.go:122] [ 33877: 33877] Allocate a new trap: 0xc0030263f0 41 D0307 22:52:16.080443 340720 usertrap_amd64.go:225] [ 33877: 33877] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:16.083961 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.084418 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.085942 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.094342 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.099275 340720 usertrap_amd64.go:212] [ 33878: 33878] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.108297 340720 usertrap_amd64.go:122] [ 33878: 33878] Allocate a new trap: 0xc00826c6c0 40 D0307 22:52:16.104272 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.102577 340720 usertrap_amd64.go:212] [ 33875: 33875] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:16.109935 340720 usertrap_amd64.go:122] [ 33875: 33875] Allocate a new trap: 0xc0002ee570 42 D0307 22:52:16.110062 340720 usertrap_amd64.go:225] [ 33875: 33875] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:16.110220 340720 usertrap_amd64.go:225] [ 33878: 33878] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.114808 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.115333 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.117100 340720 usertrap_amd64.go:212] [ 33877: 33877] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:16.117219 340720 usertrap_amd64.go:122] [ 33877: 33877] Allocate a new trap: 0xc0030263f0 42 D0307 22:52:16.117327 340720 usertrap_amd64.go:225] [ 33877: 33877] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:16.117515 340720 usertrap_amd64.go:212] [ 33868: 33868] Found the pattern at ip 55def6d7ce1a:sysno 230 D0307 22:52:16.117605 340720 usertrap_amd64.go:122] [ 33868: 33868] Allocate a new trap: 0xc002c02120 43 D0307 22:52:16.117695 340720 usertrap_amd64.go:225] [ 33868: 33868] Apply the binary patch addr 55def6d7ce1a trap addr 69d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:16.119063 340720 task_exit.go:204] [ 33875: 33875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.119031 340720 task_signals.go:204] [ 33875: 33879] Signal 33875, PID: 33879, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.119300 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.119599 340720 task_exit.go:204] [ 33875: 33875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.119751 340720 task_exit.go:204] [ 33875: 33879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.119860 340720 usertrap_amd64.go:212] [ 33878: 33878] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.119986 340720 usertrap_amd64.go:122] [ 33878: 33878] Allocate a new trap: 0xc00826c6c0 41 D0307 22:52:16.120068 340720 usertrap_amd64.go:225] [ 33878: 33878] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:16.124251 340720 task_exit.go:204] [ 33875: 33879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.124395 340720 task_exit.go:204] [ 33875: 33879] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.124517 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:16.124710 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.124827 340720 task_exit.go:204] [ 33875: 33875] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.126150 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.127426 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r0, 0x0, 0x0) D0307 22:52:16.134473 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.139311 340720 usertrap_amd64.go:212] [ 33877: 33877] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.139441 340720 usertrap_amd64.go:122] [ 33877: 33877] Allocate a new trap: 0xc0030263f0 43 D0307 22:52:16.139555 340720 usertrap_amd64.go:225] [ 33877: 33877] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.140395 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.141204 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.144113 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.146634 340720 task_signals.go:470] [ 33868: 33868] Notified of signal 20 D0307 22:52:16.147216 340720 task_signals.go:808] [ 33868: 33868] Signal 20: stopping 4 threads in thread group D0307 22:52:16.147541 340720 task_stop.go:118] [ 33868: 33872] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.147704 340720 task_stop.go:118] [ 33868: 33868] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.148085 340720 task_exit.go:204] [ 33877: 33877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.148147 340720 task_signals.go:885] [ 33868: 33880] Completing group stop D0307 22:52:16.148243 340720 task_stop.go:118] [ 33868: 33880] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.148326 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.148489 340720 task_signals.go:204] [ 33877: 33881] Signal 33877, PID: 33881, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.148602 340720 task_exit.go:204] [ 33877: 33877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.148919 340720 task_stop.go:118] [ 33868: 33876] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.149062 340720 task_exit.go:204] [ 33877: 33881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.154113 340720 task_signals.go:828] [ 33868: 33868] Ending complete group stop with 0 threads pending D0307 22:52:16.154497 340720 task_stop.go:138] [ 33868: 33868] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.154549 340720 task_stop.go:138] [ 33868: 33872] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.154606 340720 task_stop.go:138] [ 33868: 33876] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.154647 340720 task_stop.go:138] [ 33868: 33880] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.154675 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.154797 340720 task_run.go:179] [ 33868: 33868] Restarting syscall 230 with restart block: not interrupted by handled signal D0307 22:52:16.154907 340720 task_run.go:182] [ 33868: 33880] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.154802 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.155547 340720 task_run.go:182] [ 33868: 33876] Restarting syscall 1: not interrupted by handled signal D0307 22:52:16.156607 340720 task_exit.go:204] [ 33877: 33881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.156683 340720 task_exit.go:204] [ 33877: 33881] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.156922 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.157174 340720 task_signals.go:470] [ 33868: 33868] Notified of signal 20 D0307 22:52:16.157354 340720 task_exit.go:204] [ 33877: 33877] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.158860 340720 task_signals.go:808] [ 33868: 33868] Signal 20: stopping 4 threads in thread group D0307 22:52:16.159053 340720 task_stop.go:118] [ 33868: 33868] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.159183 340720 task_stop.go:118] [ 33868: 33880] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.159431 340720 task_stop.go:118] [ 33868: 33876] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.160506 340720 task_signals.go:885] [ 33868: 33872] Completing group stop D0307 22:52:16.160680 340720 task_stop.go:118] [ 33868: 33872] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.160769 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 22:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) D0307 22:52:16.164590 340720 task_signals.go:828] [ 33868: 33868] Ending complete group stop with 0 threads pending D0307 22:52:16.164795 340720 task_stop.go:138] [ 33868: 33868] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.164872 340720 task_stop.go:138] [ 33868: 33872] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.165097 340720 task_stop.go:138] [ 33868: 33876] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.165206 340720 task_stop.go:138] [ 33868: 33880] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.165259 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.165623 340720 task_run.go:182] [ 33868: 33880] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.165699 340720 task_run.go:182] [ 33868: 33876] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.169139 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.169440 340720 task_run.go:179] [ 33868: 33868] Restarting syscall 230 with restart block: not interrupted by handled signal D0307 22:52:16.169700 340720 task_signals.go:470] [ 33868: 33868] Notified of signal 20 D0307 22:52:16.169946 340720 task_signals.go:808] [ 33868: 33868] Signal 20: stopping 4 threads in thread group D0307 22:52:16.170057 340720 task_stop.go:118] [ 33868: 33868] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.170165 340720 task_stop.go:118] [ 33868: 33872] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.170255 340720 task_stop.go:118] [ 33868: 33880] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.170331 340720 task_signals.go:885] [ 33868: 33876] Completing group stop D0307 22:52:16.170382 340720 task_stop.go:118] [ 33868: 33876] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.170467 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.172481 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.172895 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.174772 340720 task_signals.go:828] [ 33868: 33868] Ending complete group stop with 0 threads pending D0307 22:52:16.174834 340720 task_stop.go:138] [ 33868: 33868] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.174891 340720 task_stop.go:138] [ 33868: 33872] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.174973 340720 task_stop.go:138] [ 33868: 33876] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.175025 340720 task_stop.go:138] [ 33868: 33880] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.175073 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.175215 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.175200 340720 task_run.go:182] [ 33868: 33876] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.175311 340720 task_run.go:182] [ 33868: 33880] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.175851 340720 task_run.go:182] [ 33868: 33872] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.179612 340720 task_signals.go:470] [ 33868: 33868] Notified of signal 20 D0307 22:52:16.184356 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.187763 340720 usertrap_amd64.go:212] [ 33882: 33882] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.187895 340720 usertrap_amd64.go:122] [ 33882: 33882] Allocate a new trap: 0xc0045f46c0 39 D0307 22:52:16.186943 340720 task_signals.go:476] [ 33868: 33872] Notified of group signal 20 D0307 22:52:16.188441 340720 usertrap_amd64.go:225] [ 33882: 33882] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:16.189576 340720 task_signals.go:808] [ 33868: 33872] Signal 20: stopping 4 threads in thread group D0307 22:52:16.189913 340720 task_stop.go:118] [ 33868: 33872] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.190123 340720 task_stop.go:118] [ 33868: 33880] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.190396 340720 task_stop.go:118] [ 33868: 33876] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.192909 340720 usertrap_amd64.go:212] [ 33882: 33882] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:16.193082 340720 usertrap_amd64.go:122] [ 33882: 33882] Allocate a new trap: 0xc0045f46c0 40 D0307 22:52:16.193178 340720 usertrap_amd64.go:225] [ 33882: 33882] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:16.194134 340720 task_signals.go:828] [ 33868: 33868] Ending incomplete group stop with 1 threads pending D0307 22:52:16.194191 340720 usertrap_amd64.go:212] [ 33878: 33878] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.194281 340720 usertrap_amd64.go:122] [ 33878: 33878] Allocate a new trap: 0xc00826c6c0 42 D0307 22:52:16.194395 340720 usertrap_amd64.go:225] [ 33878: 33878] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.194219 340720 task_stop.go:138] [ 33868: 33872] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.195913 340720 task_stop.go:138] [ 33868: 33876] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.196009 340720 task_stop.go:138] [ 33868: 33880] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.196095 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.196487 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.196624 340720 task_run.go:182] [ 33868: 33872] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.197055 340720 task_run.go:182] [ 33868: 33876] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.197246 340720 task_run.go:182] [ 33868: 33880] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.198322 340720 task_signals.go:476] [ 33868: 33872] Notified of group signal 20 D0307 22:52:16.198503 340720 task_signals.go:808] [ 33868: 33872] Signal 20: stopping 4 threads in thread group D0307 22:52:16.198605 340720 task_stop.go:118] [ 33868: 33872] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.198734 340720 task_stop.go:118] [ 33868: 33880] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.198839 340720 task_stop.go:118] [ 33868: 33876] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.198965 340720 task_signals.go:885] [ 33868: 33868] Completing group stop D0307 22:52:16.199082 340720 task_stop.go:118] [ 33868: 33868] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.199176 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.201233 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.201639 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.206720 340720 task_signals.go:481] [ 33868: 33868] No task notified of signal 20 D0307 22:52:16.207221 340720 task_signals.go:828] [ 33868: 33868] Ending complete group stop with 0 threads pending D0307 22:52:16.207308 340720 task_stop.go:138] [ 33868: 33868] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.207433 340720 task_stop.go:138] [ 33868: 33872] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.207510 340720 task_stop.go:138] [ 33868: 33876] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.207553 340720 task_stop.go:138] [ 33868: 33880] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.207616 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.207832 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.207897 340720 task_run.go:182] [ 33868: 33876] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.207997 340720 task_run.go:182] [ 33868: 33872] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.208030 340720 task_run.go:182] [ 33868: 33880] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.208825 340720 usertrap_amd64.go:212] [ 33868: 33868] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:16.208999 340720 usertrap_amd64.go:122] [ 33868: 33868] Allocate a new trap: 0xc002c02120 44 D0307 22:52:16.209184 340720 usertrap_amd64.go:225] [ 33868: 33868] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:16.214627 340720 usertrap_amd64.go:212] [ 33878: 33878] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.214750 340720 usertrap_amd64.go:122] [ 33878: 33878] Allocate a new trap: 0xc00826c6c0 43 D0307 22:52:16.214793 340720 task_signals.go:443] [ 33868: 33868] Discarding ignored signal 18 D0307 22:52:16.214872 340720 usertrap_amd64.go:225] [ 33878: 33878] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.215629 340720 task_exit.go:204] [ 33868: 33868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.215819 340720 task_signals.go:204] [ 33868: 33876] Signal 33868, PID: 33876, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.215865 340720 task_exit.go:204] [ 33868: 33868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.216041 340720 task_exit.go:204] [ 33868: 33876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.216185 340720 task_signals.go:204] [ 33868: 33880] Signal 33868, PID: 33880, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.216344 340720 task_signals.go:204] [ 33868: 33872] Signal 33868, PID: 33872, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.216482 340720 task_exit.go:204] [ 33868: 33876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.216567 340720 task_exit.go:204] [ 33868: 33876] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.216752 340720 task_signals.go:481] [ 33868: 33868] No task notified of signal 20 D0307 22:52:16.216899 340720 task_exit.go:204] [ 33868: 33880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.217667 340720 task_exit.go:204] [ 33868: 33872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.218109 340720 task_exit.go:204] [ 33868: 33872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.218187 340720 task_exit.go:204] [ 33868: 33872] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.221804 340720 task_exit.go:204] [ 33868: 33880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.222113 340720 task_exit.go:204] [ 33868: 33880] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.222772 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.223344 340720 task_exit.go:204] [ 33868: 33868] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.224122 340720 usertrap_amd64.go:212] [ 33883: 33883] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:16.224284 340720 usertrap_amd64.go:122] [ 33883: 33883] Allocate a new trap: 0xc0002ee7e0 40 D0307 22:52:16.224894 340720 usertrap_amd64.go:225] [ 33883: 33883] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:16.226872 340720 usertrap_amd64.go:212] [ 33883: 33883] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:16.226927 340720 usertrap_amd64.go:122] [ 33883: 33883] Allocate a new trap: 0xc0002ee7e0 41 D0307 22:52:16.226986 340720 usertrap_amd64.go:225] [ 33883: 33883] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:16.227769 340720 task_exit.go:204] [ 33878: 33878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.228186 340720 task_exit.go:204] [ 33878: 33878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.231400 340720 usertrap_amd64.go:212] [ 33882: 33882] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:16.231587 340720 usertrap_amd64.go:122] [ 33882: 33882] Allocate a new trap: 0xc0045f46c0 41 D0307 22:52:16.231681 340720 task_signals.go:204] [ 33878: 33884] Signal 33878, PID: 33884, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.231771 340720 usertrap_amd64.go:225] [ 33882: 33882] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:16.231833 340720 task_exit.go:204] [ 33878: 33884] Transitioning from exit state TaskExitNone to TaskExitInitiated 22:52:16 executing program 0: timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000002100)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7}, 0x7) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x2401, 0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) D0307 22:52:16.238174 340720 task_exit.go:204] [ 33878: 33884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.238347 340720 task_exit.go:204] [ 33878: 33884] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.238567 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.239599 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.240492 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.240709 340720 task_exit.go:204] [ 33878: 33878] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 3: pipe(&(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0x8901, &(0x7f0000000300)) D0307 22:52:16.243811 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.244334 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.251197 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.251598 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.255514 340720 usertrap_amd64.go:212] [ 33882: 33882] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:16.255597 340720 usertrap_amd64.go:122] [ 33882: 33882] Allocate a new trap: 0xc0045f46c0 42 D0307 22:52:16.255693 340720 usertrap_amd64.go:225] [ 33882: 33882] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:16.260757 340720 task_exit.go:204] [ 33882: 33882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.261005 340720 task_signals.go:204] [ 33882: 33885] Signal 33882, PID: 33885, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.261099 340720 task_exit.go:204] [ 33882: 33885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.261394 340720 task_exit.go:204] [ 33882: 33882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.263519 340720 usertrap_amd64.go:212] [ 33883: 33883] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:16.263617 340720 usertrap_amd64.go:122] [ 33883: 33883] Allocate a new trap: 0xc0002ee7e0 42 D0307 22:52:16.263758 340720 usertrap_amd64.go:225] [ 33883: 33883] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:16.266831 340720 task_exit.go:204] [ 33882: 33885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.266895 340720 task_exit.go:204] [ 33882: 33885] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.266977 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:16.267758 340720 task_exit.go:204] [ 33882: 33882] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r0, 0x0, 0x0) D0307 22:52:16.278903 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.279330 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.292710 340720 usertrap_amd64.go:212] [ 33883: 33883] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.292807 340720 usertrap_amd64.go:122] [ 33883: 33883] Allocate a new trap: 0xc0002ee7e0 43 D0307 22:52:16.292881 340720 usertrap_amd64.go:225] [ 33883: 33883] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.298173 340720 usertrap_amd64.go:212] [ 33886: 33886] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:16.298364 340720 usertrap_amd64.go:122] [ 33886: 33886] Allocate a new trap: 0xc00826c9f0 40 D0307 22:52:16.299106 340720 usertrap_amd64.go:225] [ 33886: 33886] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:16.302583 340720 task_exit.go:204] [ 33883: 33883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.302947 340720 task_signals.go:204] [ 33883: 33888] Signal 33883, PID: 33888, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.303070 340720 task_exit.go:204] [ 33883: 33888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.303492 340720 task_exit.go:204] [ 33883: 33883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.305372 340720 usertrap_amd64.go:212] [ 33887: 33887] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.305489 340720 usertrap_amd64.go:122] [ 33887: 33887] Allocate a new trap: 0xc0033fc6f0 40 D0307 22:52:16.306171 340720 usertrap_amd64.go:225] [ 33887: 33887] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.307091 340720 task_exit.go:204] [ 33883: 33888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.307156 340720 task_exit.go:204] [ 33883: 33888] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.307275 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.307423 340720 usertrap_amd64.go:212] [ 33886: 33886] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:16.307502 340720 usertrap_amd64.go:122] [ 33886: 33886] Allocate a new trap: 0xc00826c9f0 41 D0307 22:52:16.307613 340720 task_exit.go:204] [ 33883: 33883] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.307648 340720 usertrap_amd64.go:225] [ 33886: 33886] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:16.311910 340720 usertrap_amd64.go:212] [ 33887: 33887] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.312018 340720 usertrap_amd64.go:122] [ 33887: 33887] Allocate a new trap: 0xc0033fc6f0 41 D0307 22:52:16.312138 340720 usertrap_amd64.go:225] [ 33887: 33887] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) 22:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) D0307 22:52:16.316873 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.317353 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.317593 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.317908 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.325215 340720 usertrap_amd64.go:212] [ 33889: 33889] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.325427 340720 usertrap_amd64.go:122] [ 33889: 33889] Allocate a new trap: 0xc0045f4840 39 D0307 22:52:16.326093 340720 usertrap_amd64.go:225] [ 33889: 33889] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:16.339368 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.339807 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.342209 340720 usertrap_amd64.go:212] [ 33887: 33887] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.342288 340720 usertrap_amd64.go:122] [ 33887: 33887] Allocate a new trap: 0xc0033fc6f0 42 D0307 22:52:16.342342 340720 usertrap_amd64.go:225] [ 33887: 33887] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.347787 340720 usertrap_amd64.go:212] [ 33889: 33889] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:16.347885 340720 usertrap_amd64.go:122] [ 33889: 33889] Allocate a new trap: 0xc0045f4840 40 D0307 22:52:16.347969 340720 usertrap_amd64.go:225] [ 33889: 33889] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:16.354940 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.356114 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.367096 340720 usertrap_amd64.go:212] [ 33887: 33887] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.367199 340720 usertrap_amd64.go:122] [ 33887: 33887] Allocate a new trap: 0xc0033fc6f0 43 D0307 22:52:16.367255 340720 usertrap_amd64.go:225] [ 33887: 33887] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.374344 340720 task_exit.go:204] [ 33887: 33887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.374607 340720 task_exit.go:204] [ 33887: 33887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.374812 340720 task_signals.go:204] [ 33887: 33891] Signal 33887, PID: 33891, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.374978 340720 task_exit.go:204] [ 33887: 33891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.379229 340720 task_exit.go:204] [ 33887: 33891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.379297 340720 task_exit.go:204] [ 33887: 33891] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.379418 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.382820 340720 usertrap_amd64.go:212] [ 33889: 33889] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:16.382950 340720 usertrap_amd64.go:122] [ 33889: 33889] Allocate a new trap: 0xc0045f4840 41 D0307 22:52:16.383127 340720 usertrap_amd64.go:225] [ 33889: 33889] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:16.383187 340720 task_exit.go:204] [ 33887: 33887] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.384304 340720 usertrap_amd64.go:212] [ 33890: 33890] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:16.384418 340720 usertrap_amd64.go:122] [ 33890: 33890] Allocate a new trap: 0xc002538cc0 40 D0307 22:52:16.385145 340720 usertrap_amd64.go:225] [ 33890: 33890] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:16.386511 340720 usertrap_amd64.go:212] [ 33886: 33886] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:16.386660 340720 usertrap_amd64.go:122] [ 33886: 33886] Allocate a new trap: 0xc00826c9f0 42 D0307 22:52:16.386808 340720 usertrap_amd64.go:225] [ 33886: 33886] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) 22:52:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x5452, &(0x7f0000000040)={0x0, "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"}) D0307 22:52:16.391760 340720 usertrap_amd64.go:212] [ 33890: 33890] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:16.391866 340720 usertrap_amd64.go:122] [ 33890: 33890] Allocate a new trap: 0xc002538cc0 41 D0307 22:52:16.391985 340720 usertrap_amd64.go:225] [ 33890: 33890] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:16.396669 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.397180 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.400699 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.401185 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.422008 340720 usertrap_amd64.go:212] [ 33890: 33890] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:16.422148 340720 usertrap_amd64.go:122] [ 33890: 33890] Allocate a new trap: 0xc002538cc0 42 D0307 22:52:16.422223 340720 usertrap_amd64.go:225] [ 33890: 33890] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:16.435660 340720 usertrap_amd64.go:212] [ 33889: 33889] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:16.435754 340720 usertrap_amd64.go:122] [ 33889: 33889] Allocate a new trap: 0xc0045f4840 42 D0307 22:52:16.435825 340720 usertrap_amd64.go:225] [ 33889: 33889] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:16.438983 340720 usertrap_amd64.go:212] [ 33890: 33890] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.439066 340720 usertrap_amd64.go:122] [ 33890: 33890] Allocate a new trap: 0xc002538cc0 43 D0307 22:52:16.439492 340720 usertrap_amd64.go:225] [ 33890: 33890] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.442521 340720 usertrap_amd64.go:212] [ 33894: 33894] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.442665 340720 usertrap_amd64.go:122] [ 33894: 33894] Allocate a new trap: 0xc001054a20 40 D0307 22:52:16.443363 340720 usertrap_amd64.go:225] [ 33894: 33894] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.444936 340720 task_exit.go:204] [ 33889: 33889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.445274 340720 task_signals.go:204] [ 33889: 33892] Signal 33889, PID: 33892, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.445334 340720 task_exit.go:204] [ 33889: 33889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.445588 340720 task_exit.go:204] [ 33889: 33892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.446546 340720 task_exit.go:204] [ 33890: 33890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.446730 340720 task_signals.go:204] [ 33890: 33895] Signal 33890, PID: 33895, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.447021 340720 task_exit.go:204] [ 33890: 33895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.447517 340720 task_exit.go:204] [ 33890: 33890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.448716 340720 usertrap_amd64.go:212] [ 33894: 33894] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.448787 340720 usertrap_amd64.go:122] [ 33894: 33894] Allocate a new trap: 0xc001054a20 41 D0307 22:52:16.448883 340720 usertrap_amd64.go:225] [ 33894: 33894] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:16.451947 340720 task_exit.go:204] [ 33889: 33892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.452007 340720 task_exit.go:204] [ 33889: 33892] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.452123 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:16.452576 340720 task_exit.go:204] [ 33890: 33895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.452620 340720 task_exit.go:204] [ 33890: 33895] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.452703 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.453181 340720 task_exit.go:204] [ 33890: 33890] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.455097 340720 task_exit.go:204] [ 33889: 33889] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) D0307 22:52:16.459311 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.460790 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.464152 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 22:52:16 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$SIOCGSTAMP(r0, 0x5450, 0x0) D0307 22:52:16.470016 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.471054 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.474368 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.474490 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.474859 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.475222 340720 usertrap_amd64.go:212] [ 33894: 33894] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.475307 340720 usertrap_amd64.go:122] [ 33894: 33894] Allocate a new trap: 0xc001054a20 42 D0307 22:52:16.475376 340720 usertrap_amd64.go:225] [ 33894: 33894] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.484552 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.488500 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.488827 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.490120 340720 usertrap_amd64.go:212] [ 33894: 33894] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.490193 340720 usertrap_amd64.go:122] [ 33894: 33894] Allocate a new trap: 0xc001054a20 43 D0307 22:52:16.490311 340720 usertrap_amd64.go:225] [ 33894: 33894] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.493905 340720 task_exit.go:204] [ 33894: 33894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.494037 340720 task_signals.go:204] [ 33894: 33897] Signal 33894, PID: 33897, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.494193 340720 task_exit.go:204] [ 33894: 33894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.494544 340720 task_exit.go:204] [ 33894: 33897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.494669 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.497697 340720 task_exit.go:204] [ 33894: 33897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.497785 340720 task_exit.go:204] [ 33894: 33897] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.497870 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.498031 340720 task_exit.go:204] [ 33894: 33894] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x5452, &(0x7f0000000040)={0x0, "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"}) I0307 22:52:16.503365 340720 watchdog.go:295] Watchdog starting loop, tasks: 49, discount: 0s D0307 22:52:16.504290 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.509195 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.509616 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.512755 340720 usertrap_amd64.go:212] [ 33899: 33899] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:16.512858 340720 usertrap_amd64.go:122] [ 33899: 33899] Allocate a new trap: 0xc00826cde0 40 D0307 22:52:16.513775 340720 usertrap_amd64.go:225] [ 33899: 33899] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:16.514343 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.517288 340720 usertrap_amd64.go:212] [ 33899: 33899] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:16.517373 340720 usertrap_amd64.go:122] [ 33899: 33899] Allocate a new trap: 0xc00826cde0 41 D0307 22:52:16.517487 340720 usertrap_amd64.go:225] [ 33899: 33899] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:16.521477 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.522502 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.524493 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.529149 340720 usertrap_amd64.go:212] [ 33898: 33898] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.529268 340720 usertrap_amd64.go:122] [ 33898: 33898] Allocate a new trap: 0xc009c1d1d0 39 D0307 22:52:16.530075 340720 usertrap_amd64.go:225] [ 33898: 33898] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:16.532985 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.533899 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.534396 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.534524 340720 usertrap_amd64.go:212] [ 33898: 33898] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:16.534592 340720 usertrap_amd64.go:122] [ 33898: 33898] Allocate a new trap: 0xc009c1d1d0 40 D0307 22:52:16.534676 340720 usertrap_amd64.go:225] [ 33898: 33898] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:16.537087 340720 usertrap_amd64.go:212] [ 33899: 33899] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:16.537190 340720 usertrap_amd64.go:122] [ 33899: 33899] Allocate a new trap: 0xc00826cde0 42 D0307 22:52:16.537248 340720 usertrap_amd64.go:212] [ 33886: 33886] Found the pattern at ip 55def6d7ce1a:sysno 230 D0307 22:52:16.537282 340720 usertrap_amd64.go:225] [ 33899: 33899] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:16.537338 340720 usertrap_amd64.go:122] [ 33886: 33886] Allocate a new trap: 0xc00826c9f0 43 D0307 22:52:16.537411 340720 usertrap_amd64.go:225] [ 33886: 33886] Apply the binary patch addr 55def6d7ce1a trap addr 69d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:16.545185 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.545656 340720 usertrap_amd64.go:212] [ 33901: 33901] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.545768 340720 usertrap_amd64.go:122] [ 33901: 33901] Allocate a new trap: 0xc004636840 40 D0307 22:52:16.546280 340720 usertrap_amd64.go:225] [ 33901: 33901] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.550395 340720 usertrap_amd64.go:212] [ 33901: 33901] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.550458 340720 usertrap_amd64.go:122] [ 33901: 33901] Allocate a new trap: 0xc004636840 41 D0307 22:52:16.550594 340720 usertrap_amd64.go:225] [ 33901: 33901] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:16.551052 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.551471 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.554147 340720 usertrap_amd64.go:212] [ 33899: 33899] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.554214 340720 usertrap_amd64.go:122] [ 33899: 33899] Allocate a new trap: 0xc00826cde0 43 D0307 22:52:16.554324 340720 usertrap_amd64.go:225] [ 33899: 33899] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.554312 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.555969 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.557004 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.561535 340720 task_exit.go:204] [ 33899: 33899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.561808 340720 task_exit.go:204] [ 33899: 33899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.562066 340720 task_signals.go:204] [ 33899: 33902] Signal 33899, PID: 33902, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.562490 340720 task_exit.go:204] [ 33899: 33902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.564698 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.565055 340720 task_signals.go:470] [ 33886: 33886] Notified of signal 20 D0307 22:52:16.565241 340720 task_signals.go:808] [ 33886: 33886] Signal 20: stopping 4 threads in thread group D0307 22:52:16.565309 340720 task_stop.go:118] [ 33886: 33886] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.565404 340720 task_stop.go:118] [ 33886: 33896] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.565545 340720 task_signals.go:885] [ 33886: 33900] Completing group stop D0307 22:52:16.565615 340720 task_stop.go:118] [ 33886: 33900] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.565702 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.565729 340720 task_stop.go:118] [ 33886: 33893] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.568512 340720 task_exit.go:204] [ 33899: 33902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.568860 340720 task_exit.go:204] [ 33899: 33902] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.569018 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.569500 340720 task_exit.go:204] [ 33899: 33899] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.574060 340720 usertrap_amd64.go:212] [ 33901: 33901] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.574187 340720 usertrap_amd64.go:122] [ 33901: 33901] Allocate a new trap: 0xc004636840 42 D0307 22:52:16.574311 340720 usertrap_amd64.go:225] [ 33901: 33901] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.575088 340720 task_signals.go:828] [ 33886: 33886] Ending complete group stop with 0 threads pending D0307 22:52:16.575162 340720 task_stop.go:138] [ 33886: 33886] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.575197 340720 task_stop.go:138] [ 33886: 33893] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.575333 340720 task_stop.go:138] [ 33886: 33896] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.575376 340720 task_stop.go:138] [ 33886: 33900] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.575403 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.575527 340720 task_run.go:182] [ 33886: 33900] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.575560 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.575681 340720 task_run.go:182] [ 33886: 33896] Restarting syscall 1: not interrupted by handled signal D0307 22:52:16.575752 340720 task_signals.go:476] [ 33886: 33896] Notified of group signal 20 D0307 22:52:16.575898 340720 task_signals.go:808] [ 33886: 33886] Signal 20: stopping 4 threads in thread group D0307 22:52:16.576379 340720 task_stop.go:118] [ 33886: 33886] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.576465 340720 task_stop.go:118] [ 33886: 33893] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.576517 340720 task_stop.go:118] [ 33886: 33900] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.577508 340720 task_signals.go:885] [ 33886: 33896] Completing group stop D0307 22:52:16.577605 340720 task_stop.go:118] [ 33886: 33896] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.577687 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.578966 340720 usertrap_amd64.go:212] [ 33898: 33898] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:16.579061 340720 usertrap_amd64.go:122] [ 33898: 33898] Allocate a new trap: 0xc009c1d1d0 41 D0307 22:52:16.579210 340720 usertrap_amd64.go:225] [ 33898: 33898] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:16.579786 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.580129 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.585767 340720 task_signals.go:481] [ 33886: 33886] No task notified of signal 20 D0307 22:52:16.586268 340720 task_signals.go:828] [ 33886: 33886] Ending complete group stop with 0 threads pending D0307 22:52:16.586362 340720 task_stop.go:138] [ 33886: 33886] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.586420 340720 task_stop.go:138] [ 33886: 33893] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.586489 340720 task_stop.go:138] [ 33886: 33896] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.586536 340720 task_stop.go:138] [ 33886: 33900] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.586605 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.586727 340720 task_run.go:182] [ 33886: 33900] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.586778 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.586850 340720 task_run.go:179] [ 33886: 33886] Restarting syscall 230 with restart block: not interrupted by handled signal D0307 22:52:16.592253 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.593958 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.594630 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.595152 340720 task_signals.go:470] [ 33886: 33886] Notified of signal 20 D0307 22:52:16.595387 340720 usertrap_amd64.go:212] [ 33901: 33901] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.595467 340720 usertrap_amd64.go:122] [ 33901: 33901] Allocate a new trap: 0xc004636840 43 D0307 22:52:16.595568 340720 usertrap_amd64.go:225] [ 33901: 33901] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.598832 340720 usertrap_amd64.go:212] [ 33898: 33898] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:16.598897 340720 usertrap_amd64.go:122] [ 33898: 33898] Allocate a new trap: 0xc009c1d1d0 42 D0307 22:52:16.598985 340720 usertrap_amd64.go:225] [ 33898: 33898] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:16.599209 340720 task_exit.go:204] [ 33901: 33901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.599357 340720 task_signals.go:204] [ 33901: 33903] Signal 33901, PID: 33903, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.599426 340720 task_exit.go:204] [ 33901: 33901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.599614 340720 task_exit.go:204] [ 33901: 33903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.601202 340720 task_signals.go:808] [ 33886: 33886] Signal 20: stopping 4 threads in thread group D0307 22:52:16.601461 340720 task_stop.go:118] [ 33886: 33896] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.601584 340720 task_signals.go:885] [ 33886: 33893] Completing group stop D0307 22:52:16.601782 340720 task_stop.go:118] [ 33886: 33886] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.601906 340720 task_stop.go:118] [ 33886: 33900] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.602107 340720 task_stop.go:118] [ 33886: 33893] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.602214 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.602804 340720 task_exit.go:204] [ 33901: 33903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.602850 340720 task_exit.go:204] [ 33901: 33903] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.602921 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.603676 340720 task_exit.go:204] [ 33901: 33901] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.604459 340720 task_signals.go:828] [ 33886: 33886] Ending complete group stop with 0 threads pending D0307 22:52:16.604532 340720 task_stop.go:138] [ 33886: 33886] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.604648 340720 task_stop.go:138] [ 33886: 33893] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.604700 340720 task_stop.go:138] [ 33886: 33896] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.604739 340720 task_stop.go:138] [ 33886: 33900] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.604772 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.604927 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.604980 340720 task_run.go:182] [ 33886: 33893] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.605004 340720 task_run.go:182] [ 33886: 33896] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.605135 340720 task_run.go:182] [ 33886: 33900] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.605320 340720 task_signals.go:470] [ 33886: 33886] Notified of signal 20 D0307 22:52:16.605473 340720 usertrap_amd64.go:212] [ 33886: 33886] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:16.605592 340720 usertrap_amd64.go:122] [ 33886: 33886] Allocate a new trap: 0xc00826c9f0 44 D0307 22:52:16.605673 340720 usertrap_amd64.go:225] [ 33886: 33886] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:16.606029 340720 task_exit.go:204] [ 33898: 33898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.606626 340720 task_exit.go:204] [ 33898: 33898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.607007 340720 task_signals.go:808] [ 33886: 33886] Signal 20: stopping 4 threads in thread group D0307 22:52:16.607106 340720 task_stop.go:118] [ 33886: 33886] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.607281 340720 task_stop.go:118] [ 33886: 33896] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.607390 340720 task_stop.go:118] [ 33886: 33900] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.606938 340720 task_signals.go:204] [ 33898: 33904] Signal 33898, PID: 33904, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.607476 340720 task_signals.go:885] [ 33886: 33893] Completing group stop D0307 22:52:16.607538 340720 task_stop.go:118] [ 33886: 33893] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.607610 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.607829 340720 task_exit.go:204] [ 33898: 33904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.611886 340720 task_exit.go:204] [ 33898: 33904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.611995 340720 task_exit.go:204] [ 33898: 33904] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.612097 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:16.612623 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.613087 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.613274 340720 task_exit.go:204] [ 33898: 33898] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.614600 340720 task_signals.go:828] [ 33886: 33886] Ending complete group stop with 0 threads pending D0307 22:52:16.614677 340720 task_stop.go:138] [ 33886: 33886] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.614722 340720 task_stop.go:138] [ 33886: 33893] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.614763 340720 task_stop.go:138] [ 33886: 33896] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.614796 340720 task_stop.go:138] [ 33886: 33900] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.614828 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.614922 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.614946 340720 task_run.go:182] [ 33886: 33896] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.614995 340720 task_run.go:182] [ 33886: 33893] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.615010 340720 task_run.go:182] [ 33886: 33900] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.615098 340720 task_signals.go:470] [ 33886: 33886] Notified of signal 20 D0307 22:52:16.616599 340720 task_signals.go:808] [ 33886: 33886] Signal 20: stopping 4 threads in thread group D0307 22:52:16.616719 340720 task_stop.go:118] [ 33886: 33886] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.616836 340720 task_stop.go:118] [ 33886: 33893] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.617321 340720 task_stop.go:118] [ 33886: 33896] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.617446 340720 task_signals.go:885] [ 33886: 33900] Completing group stop D0307 22:52:16.617514 340720 task_stop.go:118] [ 33886: 33900] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.617605 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.619824 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.620168 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.627062 340720 task_signals.go:481] [ 33886: 33886] No task notified of signal 20 D0307 22:52:16.627223 340720 task_signals.go:828] [ 33886: 33886] Ending complete group stop with 0 threads pending D0307 22:52:16.627280 340720 task_stop.go:138] [ 33886: 33886] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.627319 340720 task_stop.go:138] [ 33886: 33893] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.627357 340720 task_stop.go:138] [ 33886: 33896] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.627388 340720 task_stop.go:138] [ 33886: 33900] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.627440 340720 task_signals.go:443] [ 33886: 33886] Discarding ignored signal 18 D0307 22:52:16.627584 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.627625 340720 task_run.go:182] [ 33886: 33900] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.627670 340720 task_run.go:182] [ 33886: 33893] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.627816 340720 task_run.go:182] [ 33886: 33896] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.629141 340720 task_exit.go:204] [ 33886: 33886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.629262 340720 task_signals.go:204] [ 33886: 33900] Signal 33886, PID: 33900, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.629304 340720 task_signals.go:204] [ 33886: 33893] Signal 33886, PID: 33893, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.629412 340720 task_exit.go:204] [ 33886: 33900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.629710 340720 task_signals.go:204] [ 33886: 33896] Signal 33886, PID: 33896, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.629746 340720 task_exit.go:204] [ 33886: 33893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.629992 340720 task_exit.go:204] [ 33886: 33886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.630184 340720 task_exit.go:204] [ 33886: 33896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.630324 340720 task_exit.go:204] [ 33886: 33900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.630381 340720 task_exit.go:204] [ 33886: 33900] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.630682 340720 task_exit.go:204] [ 33886: 33893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.630754 340720 task_exit.go:204] [ 33886: 33893] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.635188 340720 task_exit.go:204] [ 33886: 33896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.635251 340720 task_exit.go:204] [ 33886: 33896] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.635341 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.635514 340720 task_exit.go:204] [ 33886: 33886] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 0: timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000002100)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x7}, 0x7) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x2401, 0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 22:52:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'batadv_slave_0\x00', {}, 0xa4}) 22:52:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x5452, &(0x7f0000000040)={0x0, "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"}) D0307 22:52:16.643430 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.643857 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:16 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$SIOCGSTAMP(r0, 0x5450, 0x0) D0307 22:52:16.668576 340720 usertrap_amd64.go:212] [ 33906: 33906] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.668807 340720 usertrap_amd64.go:122] [ 33906: 33906] Allocate a new trap: 0xc004f827b0 39 D0307 22:52:16.669406 340720 usertrap_amd64.go:225] [ 33906: 33906] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:16.671662 340720 usertrap_amd64.go:212] [ 33905: 33905] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:16.671962 340720 usertrap_amd64.go:122] [ 33905: 33905] Allocate a new trap: 0xc0045f4f90 40 D0307 22:52:16.672218 340720 usertrap_amd64.go:212] [ 33908: 33908] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.672321 340720 usertrap_amd64.go:122] [ 33908: 33908] Allocate a new trap: 0xc001bb6810 40 D0307 22:52:16.672487 340720 usertrap_amd64.go:225] [ 33905: 33905] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:16.673032 340720 usertrap_amd64.go:225] [ 33908: 33908] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.674505 340720 usertrap_amd64.go:212] [ 33907: 33907] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:16.674583 340720 usertrap_amd64.go:122] [ 33907: 33907] Allocate a new trap: 0xc009c1d770 40 D0307 22:52:16.675155 340720 usertrap_amd64.go:225] [ 33907: 33907] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:16.675590 340720 usertrap_amd64.go:212] [ 33905: 33905] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:16.675643 340720 usertrap_amd64.go:122] [ 33905: 33905] Allocate a new trap: 0xc0045f4f90 41 D0307 22:52:16.675729 340720 usertrap_amd64.go:225] [ 33905: 33905] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:16.676038 340720 usertrap_amd64.go:212] [ 33908: 33908] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.676100 340720 usertrap_amd64.go:122] [ 33908: 33908] Allocate a new trap: 0xc001bb6810 41 D0307 22:52:16.676182 340720 usertrap_amd64.go:225] [ 33908: 33908] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:16.678732 340720 usertrap_amd64.go:212] [ 33907: 33907] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:16.678792 340720 usertrap_amd64.go:122] [ 33907: 33907] Allocate a new trap: 0xc009c1d770 41 D0307 22:52:16.679097 340720 usertrap_amd64.go:225] [ 33907: 33907] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:16.680719 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.681357 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.681943 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.682455 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.682667 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.683193 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.686937 340720 usertrap_amd64.go:212] [ 33906: 33906] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:16.687004 340720 usertrap_amd64.go:122] [ 33906: 33906] Allocate a new trap: 0xc004f827b0 40 D0307 22:52:16.687074 340720 usertrap_amd64.go:225] [ 33906: 33906] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:16.690718 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.691207 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.694077 340720 usertrap_amd64.go:212] [ 33905: 33905] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:16.694193 340720 usertrap_amd64.go:122] [ 33905: 33905] Allocate a new trap: 0xc0045f4f90 42 D0307 22:52:16.694307 340720 usertrap_amd64.go:225] [ 33905: 33905] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:16.699854 340720 usertrap_amd64.go:212] [ 33906: 33906] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:16.699927 340720 usertrap_amd64.go:122] [ 33906: 33906] Allocate a new trap: 0xc004f827b0 41 D0307 22:52:16.699991 340720 usertrap_amd64.go:225] [ 33906: 33906] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:16.712253 340720 usertrap_amd64.go:212] [ 33908: 33908] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.712347 340720 usertrap_amd64.go:122] [ 33908: 33908] Allocate a new trap: 0xc001bb6810 42 D0307 22:52:16.712335 340720 usertrap_amd64.go:212] [ 33907: 33907] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:16.712447 340720 usertrap_amd64.go:225] [ 33908: 33908] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.712456 340720 usertrap_amd64.go:122] [ 33907: 33907] Allocate a new trap: 0xc009c1d770 42 D0307 22:52:16.712550 340720 usertrap_amd64.go:225] [ 33907: 33907] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:16.724279 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.724722 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.728129 340720 usertrap_amd64.go:212] [ 33908: 33908] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.728248 340720 usertrap_amd64.go:122] [ 33908: 33908] Allocate a new trap: 0xc001bb6810 43 D0307 22:52:16.728464 340720 usertrap_amd64.go:225] [ 33908: 33908] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.730238 340720 usertrap_amd64.go:212] [ 33906: 33906] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:16.730333 340720 usertrap_amd64.go:122] [ 33906: 33906] Allocate a new trap: 0xc004f827b0 42 D0307 22:52:16.730390 340720 usertrap_amd64.go:225] [ 33906: 33906] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:16.733741 340720 task_exit.go:204] [ 33906: 33906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.733920 340720 task_exit.go:204] [ 33906: 33906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.734090 340720 task_signals.go:204] [ 33906: 33909] Signal 33906, PID: 33909, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.734166 340720 task_exit.go:204] [ 33906: 33909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.738026 340720 task_exit.go:204] [ 33906: 33909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.738163 340720 task_exit.go:204] [ 33906: 33909] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.738268 340720 usertrap_amd64.go:212] [ 33905: 33905] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.738381 340720 usertrap_amd64.go:122] [ 33905: 33905] Allocate a new trap: 0xc0045f4f90 43 D0307 22:52:16.738326 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:16.738453 340720 usertrap_amd64.go:225] [ 33905: 33905] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.738613 340720 task_exit.go:204] [ 33906: 33906] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.739733 340720 task_exit.go:204] [ 33908: 33908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.740008 340720 task_signals.go:204] [ 33908: 33912] Signal 33908, PID: 33912, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.740090 340720 task_exit.go:204] [ 33908: 33908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.740173 340720 task_exit.go:204] [ 33908: 33912] Transitioning from exit state TaskExitNone to TaskExitInitiated 22:52:16 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$SIOCGSTAMP(r0, 0x5450, 0x0) D0307 22:52:16.744911 340720 task_exit.go:204] [ 33908: 33912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.745055 340720 task_exit.go:204] [ 33908: 33912] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.745153 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.746078 340720 task_exit.go:204] [ 33908: 33908] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x5452, &(0x7f0000000040)={0x0, "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"}) D0307 22:52:16.749196 340720 task_exit.go:204] [ 33905: 33905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.749376 340720 task_signals.go:204] [ 33905: 33910] Signal 33905, PID: 33910, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.749513 340720 task_exit.go:204] [ 33905: 33910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.750377 340720 task_exit.go:204] [ 33905: 33905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.753687 340720 task_exit.go:204] [ 33905: 33910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.753758 340720 task_exit.go:204] [ 33905: 33910] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.753893 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.754122 340720 task_exit.go:204] [ 33905: 33905] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.755604 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.756092 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:16 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r0, 0x0, 0x0) D0307 22:52:16.760681 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.761062 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.762287 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.762872 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.792126 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.795725 340720 usertrap_amd64.go:212] [ 33913: 33913] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.795835 340720 usertrap_amd64.go:122] [ 33913: 33913] Allocate a new trap: 0xc002c02a80 40 D0307 22:52:16.796359 340720 usertrap_amd64.go:225] [ 33913: 33913] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.796657 340720 usertrap_amd64.go:212] [ 33915: 33915] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.796804 340720 usertrap_amd64.go:122] [ 33915: 33915] Allocate a new trap: 0xc004f82900 39 D0307 22:52:16.797535 340720 usertrap_amd64.go:225] [ 33915: 33915] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:16.802298 340720 usertrap_amd64.go:212] [ 33913: 33913] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.802367 340720 usertrap_amd64.go:122] [ 33913: 33913] Allocate a new trap: 0xc002c02a80 41 D0307 22:52:16.802468 340720 usertrap_amd64.go:225] [ 33913: 33913] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:16.802451 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.803292 340720 usertrap_amd64.go:212] [ 33915: 33915] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:16.803414 340720 usertrap_amd64.go:122] [ 33915: 33915] Allocate a new trap: 0xc004f82900 40 D0307 22:52:16.803558 340720 usertrap_amd64.go:225] [ 33915: 33915] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:16.805849 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.806368 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.807411 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.808213 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.808960 340720 usertrap_amd64.go:212] [ 33914: 33914] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:16.809109 340720 usertrap_amd64.go:122] [ 33914: 33914] Allocate a new trap: 0xc001bb6a80 40 D0307 22:52:16.809835 340720 usertrap_amd64.go:225] [ 33914: 33914] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:16.813210 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.819342 340720 usertrap_amd64.go:212] [ 33913: 33913] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.819442 340720 usertrap_amd64.go:122] [ 33913: 33913] Allocate a new trap: 0xc002c02a80 42 D0307 22:52:16.819507 340720 usertrap_amd64.go:225] [ 33913: 33913] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.822285 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.826837 340720 usertrap_amd64.go:212] [ 33914: 33914] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:16.826940 340720 usertrap_amd64.go:122] [ 33914: 33914] Allocate a new trap: 0xc001bb6a80 41 D0307 22:52:16.827020 340720 usertrap_amd64.go:225] [ 33914: 33914] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:16.828235 340720 usertrap_amd64.go:212] [ 33915: 33915] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:16.828354 340720 usertrap_amd64.go:122] [ 33915: 33915] Allocate a new trap: 0xc004f82900 41 D0307 22:52:16.828437 340720 usertrap_amd64.go:225] [ 33915: 33915] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:16.828642 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.829108 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.830597 340720 usertrap_amd64.go:212] [ 33913: 33913] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.830691 340720 usertrap_amd64.go:122] [ 33913: 33913] Allocate a new trap: 0xc002c02a80 43 D0307 22:52:16.830799 340720 usertrap_amd64.go:225] [ 33913: 33913] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.832307 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.832754 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.833453 340720 task_exit.go:204] [ 33913: 33913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.833706 340720 task_exit.go:204] [ 33913: 33913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.834230 340720 task_signals.go:204] [ 33913: 33917] Signal 33913, PID: 33917, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.834323 340720 task_exit.go:204] [ 33913: 33917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.837155 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.837741 340720 task_exit.go:204] [ 33913: 33917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.837823 340720 task_exit.go:204] [ 33913: 33917] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.837944 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.839611 340720 task_exit.go:204] [ 33913: 33913] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.843154 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 22:52:16 executing program 3: inotify_rm_watch(0xffffffffffffffff, 0x0) D0307 22:52:16.851105 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.852289 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.853542 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.857048 340720 usertrap_amd64.go:212] [ 33915: 33915] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:16.857148 340720 usertrap_amd64.go:122] [ 33915: 33915] Allocate a new trap: 0xc004f82900 42 D0307 22:52:16.857232 340720 usertrap_amd64.go:225] [ 33915: 33915] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:16.858268 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.858702 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.860803 340720 task_exit.go:204] [ 33915: 33915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.861129 340720 task_signals.go:204] [ 33915: 33918] Signal 33915, PID: 33918, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.861277 340720 task_exit.go:204] [ 33915: 33918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.861816 340720 task_exit.go:204] [ 33915: 33918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.861916 340720 task_exit.go:204] [ 33915: 33918] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.862306 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.865062 340720 usertrap_amd64.go:212] [ 33914: 33914] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:16.865190 340720 usertrap_amd64.go:122] [ 33914: 33914] Allocate a new trap: 0xc001bb6a80 42 D0307 22:52:16.865284 340720 usertrap_amd64.go:212] [ 33907: 33907] Found the pattern at ip 55def6d7ce1a:sysno 230 D0307 22:52:16.865384 340720 usertrap_amd64.go:122] [ 33907: 33907] Allocate a new trap: 0xc009c1d770 43 D0307 22:52:16.865469 340720 usertrap_amd64.go:225] [ 33907: 33907] Apply the binary patch addr 55def6d7ce1a trap addr 69d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:16.865294 340720 usertrap_amd64.go:225] [ 33914: 33914] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:16.865737 340720 task_exit.go:204] [ 33915: 33915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.866106 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:16.866292 340720 task_exit.go:204] [ 33915: 33915] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.873055 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.875245 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.875651 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.877397 340720 usertrap_amd64.go:212] [ 33914: 33914] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:16.877514 340720 usertrap_amd64.go:122] [ 33914: 33914] Allocate a new trap: 0xc001bb6a80 43 D0307 22:52:16.877619 340720 usertrap_amd64.go:225] [ 33914: 33914] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:16.880120 340720 task_exit.go:204] [ 33914: 33914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.880275 340720 task_signals.go:204] [ 33914: 33921] Signal 33914, PID: 33921, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.880377 340720 task_exit.go:204] [ 33914: 33921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.880480 340720 task_exit.go:204] [ 33914: 33914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.882680 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.885820 340720 task_exit.go:204] [ 33914: 33921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.885972 340720 task_exit.go:204] [ 33914: 33921] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.886087 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:16.889121 340720 task_exit.go:204] [ 33914: 33914] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.891228 340720 task_signals.go:470] [ 33907: 33907] Notified of signal 20 D0307 22:52:16.891355 340720 task_signals.go:808] [ 33907: 33907] Signal 20: stopping 4 threads in thread group D0307 22:52:16.891421 340720 task_stop.go:118] [ 33907: 33907] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.891476 340720 task_stop.go:118] [ 33907: 33916] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.891580 340720 task_stop.go:118] [ 33907: 33911] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.891666 340720 task_signals.go:885] [ 33907: 33919] Completing group stop D0307 22:52:16.891719 340720 task_stop.go:118] [ 33907: 33919] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.891802 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.892754 340720 task_signals.go:828] [ 33907: 33907] Ending complete group stop with 0 threads pending D0307 22:52:16.892827 340720 task_stop.go:138] [ 33907: 33907] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.892855 340720 task_stop.go:138] [ 33907: 33911] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.892889 340720 task_stop.go:138] [ 33907: 33916] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.892911 340720 task_stop.go:138] [ 33907: 33919] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.892998 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.893206 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.893249 340720 task_run.go:182] [ 33907: 33916] Restarting syscall 1: not interrupted by handled signal D0307 22:52:16.893309 340720 task_run.go:182] [ 33907: 33919] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.895156 340720 usertrap_amd64.go:212] [ 33907: 33907] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:16.895210 340720 usertrap_amd64.go:122] [ 33907: 33907] Allocate a new trap: 0xc009c1d770 44 D0307 22:52:16.895286 340720 usertrap_amd64.go:225] [ 33907: 33907] Apply the binary patch addr 55def6d09fa4 trap addr 69dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 157 6 0]) D0307 22:52:16.898012 340720 usertrap_amd64.go:212] [ 33920: 33920] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:16.898145 340720 usertrap_amd64.go:122] [ 33920: 33920] Allocate a new trap: 0xc004f82a80 40 D0307 22:52:16.898621 340720 usertrap_amd64.go:225] [ 33920: 33920] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:16.901189 340720 task_signals.go:470] [ 33907: 33907] Notified of signal 20 D0307 22:52:16.903769 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.904856 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.905664 340720 usertrap_amd64.go:212] [ 33920: 33920] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:16.905732 340720 usertrap_amd64.go:122] [ 33920: 33920] Allocate a new trap: 0xc004f82a80 41 D0307 22:52:16.905824 340720 usertrap_amd64.go:225] [ 33920: 33920] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:16.906162 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.909880 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:16.911227 340720 task_signals.go:476] [ 33907: 33911] Notified of group signal 20 D0307 22:52:16.911513 340720 task_signals.go:808] [ 33907: 33911] Signal 20: stopping 4 threads in thread group D0307 22:52:16.911588 340720 task_stop.go:118] [ 33907: 33911] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.911647 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.911728 340720 task_stop.go:118] [ 33907: 33916] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.911796 340720 task_stop.go:118] [ 33907: 33919] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.912213 340720 task_signals.go:828] [ 33907: 33907] Ending incomplete group stop with 1 threads pending D0307 22:52:16.912295 340720 task_stop.go:138] [ 33907: 33911] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.912336 340720 task_stop.go:138] [ 33907: 33916] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.912369 340720 task_stop.go:138] [ 33907: 33919] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.912420 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.912507 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.912578 340720 task_run.go:182] [ 33907: 33919] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.912782 340720 task_run.go:182] [ 33907: 33916] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.912981 340720 task_run.go:182] [ 33907: 33911] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.921202 340720 task_signals.go:470] [ 33907: 33907] Notified of signal 20 D0307 22:52:16.921508 340720 task_signals.go:808] [ 33907: 33907] Signal 20: stopping 4 threads in thread group D0307 22:52:16.921873 340720 task_stop.go:118] [ 33907: 33911] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.922054 340720 task_stop.go:118] [ 33907: 33916] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.922161 340720 task_signals.go:885] [ 33907: 33919] Completing group stop D0307 22:52:16.922251 340720 task_stop.go:118] [ 33907: 33919] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.922356 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.922499 340720 task_signals.go:828] [ 33907: 33907] Ending complete group stop with 0 threads pending D0307 22:52:16.922558 340720 task_stop.go:138] [ 33907: 33911] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.922624 340720 task_stop.go:138] [ 33907: 33916] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.922667 340720 task_stop.go:138] [ 33907: 33919] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.922717 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.922842 340720 task_run.go:182] [ 33907: 33911] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.923183 340720 task_run.go:182] [ 33907: 33916] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.924282 340720 task_stop.go:118] [ 33907: 33907] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.925126 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.925194 340720 task_run.go:182] [ 33907: 33919] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.926126 340720 usertrap_amd64.go:212] [ 33920: 33920] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:16.926249 340720 usertrap_amd64.go:122] [ 33920: 33920] Allocate a new trap: 0xc004f82a80 42 D0307 22:52:16.926387 340720 usertrap_amd64.go:225] [ 33920: 33920] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:16.932172 340720 task_signals.go:476] [ 33907: 33911] Notified of group signal 20 D0307 22:52:16.932324 340720 task_signals.go:808] [ 33907: 33911] Signal 20: stopping 4 threads in thread group D0307 22:52:16.932397 340720 task_stop.go:118] [ 33907: 33911] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932507 340720 task_stop.go:118] [ 33907: 33919] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932590 340720 task_stop.go:118] [ 33907: 33916] Entering internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932698 340720 task_signals.go:828] [ 33907: 33907] Ending incomplete group stop with 1 threads pending D0307 22:52:16.932735 340720 task_stop.go:138] [ 33907: 33907] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932773 340720 task_stop.go:138] [ 33907: 33911] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932796 340720 task_stop.go:138] [ 33907: 33916] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932829 340720 task_stop.go:138] [ 33907: 33919] Leaving internal stop (*kernel.groupStop)(nil) D0307 22:52:16.932864 340720 task_signals.go:443] [ 33907: 33907] Discarding ignored signal 18 D0307 22:52:16.932979 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.933079 340720 task_run.go:182] [ 33907: 33919] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.933216 340720 task_run.go:182] [ 33907: 33911] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.933243 340720 task_run.go:182] [ 33907: 33916] Restarting syscall 202: not interrupted by handled signal D0307 22:52:16.938294 340720 task_exit.go:204] [ 33907: 33907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.938538 340720 task_signals.go:204] [ 33907: 33919] Signal 33907, PID: 33919, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.938634 340720 task_signals.go:204] [ 33907: 33911] Signal 33907, PID: 33911, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.938728 340720 task_exit.go:204] [ 33907: 33919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.938840 340720 task_exit.go:204] [ 33907: 33911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.938936 340720 task_signals.go:204] [ 33907: 33916] Signal 33907, PID: 33916, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.939127 340720 task_exit.go:204] [ 33907: 33919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.939202 340720 task_exit.go:204] [ 33907: 33919] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.939792 340720 task_exit.go:204] [ 33907: 33911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.939880 340720 task_exit.go:204] [ 33907: 33911] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.940251 340720 task_exit.go:204] [ 33907: 33916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.941092 340720 task_signals.go:481] [ 33907: 33907] No task notified of signal 20 D0307 22:52:16.942835 340720 task_signals.go:481] [ 33907: 33907] No task notified of signal 18 D0307 22:52:16.943653 340720 task_exit.go:204] [ 33907: 33916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.943722 340720 task_exit.go:204] [ 33907: 33916] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.944238 340720 task_exit.go:204] [ 33907: 33907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.944442 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:16.946364 340720 usertrap_amd64.go:212] [ 33920: 33920] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:16.946434 340720 usertrap_amd64.go:122] [ 33920: 33920] Allocate a new trap: 0xc004f82a80 43 D0307 22:52:16.946491 340720 usertrap_amd64.go:225] [ 33920: 33920] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:16.947465 340720 task_exit.go:204] [ 33907: 33907] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.949767 340720 task_exit.go:204] [ 33920: 33920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:16.950062 340720 task_exit.go:204] [ 33920: 33920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.950219 340720 task_signals.go:204] [ 33920: 33922] Signal 33920, PID: 33922, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:16.950373 340720 task_exit.go:204] [ 33920: 33922] Transitioning from exit state TaskExitNone to TaskExitInitiated 22:52:16 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r0, 0x0, 0x0) D0307 22:52:16.957417 340720 task_exit.go:204] [ 33920: 33922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:16.957481 340720 task_exit.go:204] [ 33920: 33922] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:16.957603 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:16.957792 340720 task_exit.go:204] [ 33920: 33920] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) 22:52:16 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$SIOCGSTAMP(r0, 0x5450, 0x0) 22:52:16 executing program 3: inotify_rm_watch(0xffffffffffffffff, 0x0) D0307 22:52:16.965918 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.966401 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.972393 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:16.972801 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:16.988463 340720 usertrap_amd64.go:212] [ 33923: 33923] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:16.988598 340720 usertrap_amd64.go:122] [ 33923: 33923] Allocate a new trap: 0xc0030273e0 39 D0307 22:52:16.989466 340720 usertrap_amd64.go:225] [ 33923: 33923] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:17.001381 340720 usertrap_amd64.go:212] [ 33923: 33923] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:17.001468 340720 usertrap_amd64.go:122] [ 33923: 33923] Allocate a new trap: 0xc0030273e0 40 D0307 22:52:17.001563 340720 usertrap_amd64.go:225] [ 33923: 33923] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:17.004864 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.005509 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.013989 340720 usertrap_amd64.go:212] [ 33924: 33924] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:17.014213 340720 usertrap_amd64.go:122] [ 33924: 33924] Allocate a new trap: 0xc007b48bd0 40 D0307 22:52:17.015244 340720 usertrap_amd64.go:225] [ 33924: 33924] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:17.021572 340720 usertrap_amd64.go:212] [ 33924: 33924] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:17.021775 340720 usertrap_amd64.go:122] [ 33924: 33924] Allocate a new trap: 0xc007b48bd0 41 D0307 22:52:17.022072 340720 usertrap_amd64.go:225] [ 33924: 33924] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:17.022506 340720 usertrap_amd64.go:212] [ 33925: 33925] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:17.022654 340720 usertrap_amd64.go:122] [ 33925: 33925] Allocate a new trap: 0xc004f82d80 40 D0307 22:52:17.023254 340720 usertrap_amd64.go:225] [ 33925: 33925] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:17.027185 340720 usertrap_amd64.go:212] [ 33925: 33925] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:17.027298 340720 usertrap_amd64.go:122] [ 33925: 33925] Allocate a new trap: 0xc004f82d80 41 D0307 22:52:17.027361 340720 usertrap_amd64.go:225] [ 33925: 33925] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:17.027749 340720 usertrap_amd64.go:212] [ 33926: 33926] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:17.027852 340720 usertrap_amd64.go:122] [ 33926: 33926] Allocate a new trap: 0xc004637440 40 D0307 22:52:17.028805 340720 usertrap_amd64.go:225] [ 33926: 33926] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:17.034969 340720 usertrap_amd64.go:212] [ 33923: 33923] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:17.035063 340720 usertrap_amd64.go:122] [ 33923: 33923] Allocate a new trap: 0xc0030273e0 41 D0307 22:52:17.035138 340720 usertrap_amd64.go:225] [ 33923: 33923] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:17.035936 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.036481 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.040145 340720 usertrap_amd64.go:212] [ 33926: 33926] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:17.040230 340720 usertrap_amd64.go:122] [ 33926: 33926] Allocate a new trap: 0xc004637440 41 D0307 22:52:17.040301 340720 usertrap_amd64.go:225] [ 33926: 33926] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:17.043411 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.044326 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.051919 340720 usertrap_amd64.go:212] [ 33923: 33923] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:17.052011 340720 usertrap_amd64.go:122] [ 33923: 33923] Allocate a new trap: 0xc0030273e0 42 D0307 22:52:17.052142 340720 usertrap_amd64.go:225] [ 33923: 33923] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:17.052432 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.052978 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.055115 340720 usertrap_amd64.go:212] [ 33925: 33925] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:17.055208 340720 usertrap_amd64.go:122] [ 33925: 33925] Allocate a new trap: 0xc004f82d80 42 D0307 22:52:17.055434 340720 usertrap_amd64.go:225] [ 33925: 33925] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:17.056046 340720 task_exit.go:204] [ 33923: 33923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.056308 340720 task_signals.go:204] [ 33923: 33927] Signal 33923, PID: 33927, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.056403 340720 task_exit.go:204] [ 33923: 33923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.056502 340720 task_exit.go:204] [ 33923: 33927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.057556 340720 usertrap_amd64.go:212] [ 33924: 33924] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:17.057625 340720 usertrap_amd64.go:122] [ 33924: 33924] Allocate a new trap: 0xc007b48bd0 42 D0307 22:52:17.057749 340720 usertrap_amd64.go:225] [ 33924: 33924] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:17.060725 340720 task_exit.go:204] [ 33923: 33927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.060830 340720 task_exit.go:204] [ 33923: 33927] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.060924 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:17.064453 340720 task_exit.go:204] [ 33923: 33923] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.071552 340720 usertrap_amd64.go:212] [ 33926: 33926] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:17.071712 340720 usertrap_amd64.go:122] [ 33926: 33926] Allocate a new trap: 0xc004637440 42 D0307 22:52:17.071917 340720 usertrap_amd64.go:225] [ 33926: 33926] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) 22:52:17 executing program 2: ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) D0307 22:52:17.075587 340720 usertrap_amd64.go:212] [ 33924: 33924] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:17.075685 340720 usertrap_amd64.go:122] [ 33924: 33924] Allocate a new trap: 0xc007b48bd0 43 D0307 22:52:17.075751 340720 usertrap_amd64.go:225] [ 33924: 33924] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:17.078714 340720 task_exit.go:204] [ 33924: 33924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.078975 340720 task_exit.go:204] [ 33924: 33924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.079350 340720 task_signals.go:204] [ 33924: 33929] Signal 33924, PID: 33929, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.079504 340720 task_exit.go:204] [ 33924: 33929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.083357 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.084048 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.084285 340720 task_exit.go:204] [ 33924: 33929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.084387 340720 task_exit.go:204] [ 33924: 33929] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.084537 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:17.084792 340720 task_exit.go:204] [ 33924: 33924] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.086861 340720 usertrap_amd64.go:212] [ 33925: 33925] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:17.086937 340720 usertrap_amd64.go:122] [ 33925: 33925] Allocate a new trap: 0xc004f82d80 43 22:52:17 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r0, 0x0, 0x0) D0307 22:52:17.087051 340720 usertrap_amd64.go:225] [ 33925: 33925] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:17.092937 340720 task_exit.go:204] [ 33925: 33925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.093302 340720 task_signals.go:204] [ 33925: 33928] Signal 33925, PID: 33928, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.093401 340720 task_exit.go:204] [ 33925: 33925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.093489 340720 task_exit.go:204] [ 33925: 33928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.098147 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.098355 340720 task_exit.go:204] [ 33925: 33928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.098417 340720 task_exit.go:204] [ 33925: 33928] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.098493 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:17.098780 340720 task_exit.go:204] [ 33925: 33925] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.098955 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) D0307 22:52:17.106634 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.107060 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.113774 340720 usertrap_amd64.go:212] [ 33926: 33926] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:17.113928 340720 usertrap_amd64.go:122] [ 33926: 33926] Allocate a new trap: 0xc004637440 43 D0307 22:52:17.114025 340720 usertrap_amd64.go:225] [ 33926: 33926] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:17.121955 340720 task_exit.go:204] [ 33926: 33926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.122682 340720 task_signals.go:204] [ 33926: 33930] Signal 33926, PID: 33930, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.122854 340720 task_exit.go:204] [ 33926: 33930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.123081 340720 task_exit.go:204] [ 33926: 33930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.123115 340720 task_exit.go:204] [ 33926: 33930] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.126328 340720 usertrap_amd64.go:212] [ 33931: 33931] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:17.126441 340720 usertrap_amd64.go:122] [ 33931: 33931] Allocate a new trap: 0xc00826d710 39 D0307 22:52:17.128383 340720 usertrap_amd64.go:225] [ 33931: 33931] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:17.128630 340720 task_exit.go:204] [ 33926: 33926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.128776 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:17.129077 340720 task_exit.go:204] [ 33926: 33926] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 3: inotify_rm_watch(0xffffffffffffffff, 0x0) D0307 22:52:17.136476 340720 usertrap_amd64.go:212] [ 33932: 33932] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:17.136733 340720 usertrap_amd64.go:122] [ 33932: 33932] Allocate a new trap: 0xc0030274d0 40 D0307 22:52:17.137611 340720 usertrap_amd64.go:225] [ 33932: 33932] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:17.140134 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.140659 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.145650 340720 usertrap_amd64.go:212] [ 33931: 33931] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:17.145751 340720 usertrap_amd64.go:122] [ 33931: 33931] Allocate a new trap: 0xc00826d710 40 D0307 22:52:17.145847 340720 usertrap_amd64.go:225] [ 33931: 33931] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:17.150340 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.150731 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.155046 340720 usertrap_amd64.go:212] [ 33932: 33932] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:17.155148 340720 usertrap_amd64.go:122] [ 33932: 33932] Allocate a new trap: 0xc0030274d0 41 D0307 22:52:17.155245 340720 usertrap_amd64.go:225] [ 33932: 33932] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:17.164034 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.164539 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.164765 340720 usertrap_amd64.go:212] [ 33933: 33933] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:17.164898 340720 usertrap_amd64.go:122] [ 33933: 33933] Allocate a new trap: 0xc0046375c0 40 D0307 22:52:17.166700 340720 usertrap_amd64.go:225] [ 33933: 33933] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:17.171315 340720 usertrap_amd64.go:212] [ 33933: 33933] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:17.171440 340720 usertrap_amd64.go:122] [ 33933: 33933] Allocate a new trap: 0xc0046375c0 41 D0307 22:52:17.171516 340720 usertrap_amd64.go:225] [ 33933: 33933] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:17.172889 340720 usertrap_amd64.go:212] [ 33931: 33931] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:17.172993 340720 usertrap_amd64.go:122] [ 33931: 33931] Allocate a new trap: 0xc00826d710 41 D0307 22:52:17.173104 340720 usertrap_amd64.go:225] [ 33931: 33931] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:17.176619 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.177151 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.184919 340720 usertrap_amd64.go:212] [ 33932: 33932] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:17.185207 340720 usertrap_amd64.go:122] [ 33932: 33932] Allocate a new trap: 0xc0030274d0 42 D0307 22:52:17.185544 340720 usertrap_amd64.go:225] [ 33932: 33932] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:17.202261 340720 usertrap_amd64.go:212] [ 33931: 33931] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:17.202347 340720 usertrap_amd64.go:122] [ 33931: 33931] Allocate a new trap: 0xc00826d710 42 D0307 22:52:17.202491 340720 usertrap_amd64.go:225] [ 33931: 33931] Apply the binary patch addr 55918ee94fa4 trap addr 61d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:17.207204 340720 usertrap_amd64.go:212] [ 33933: 33933] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:17.207357 340720 usertrap_amd64.go:122] [ 33933: 33933] Allocate a new trap: 0xc0046375c0 42 D0307 22:52:17.207474 340720 usertrap_amd64.go:225] [ 33933: 33933] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:17.207232 340720 task_exit.go:204] [ 33931: 33931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.209085 340720 task_exit.go:204] [ 33931: 33931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.209321 340720 task_signals.go:204] [ 33931: 33935] Signal 33931, PID: 33935, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.209706 340720 task_exit.go:204] [ 33931: 33935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.210526 340720 usertrap_amd64.go:212] [ 33934: 33934] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:17.210650 340720 usertrap_amd64.go:122] [ 33934: 33934] Allocate a new trap: 0xc00826d800 40 D0307 22:52:17.211397 340720 usertrap_amd64.go:225] [ 33934: 33934] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:17.214118 340720 task_exit.go:204] [ 33931: 33935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.214239 340720 task_exit.go:204] [ 33931: 33935] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.214376 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:17.215300 340720 task_exit.go:204] [ 33931: 33931] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) D0307 22:52:17.217370 340720 usertrap_amd64.go:212] [ 33932: 33932] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:17.217483 340720 usertrap_amd64.go:122] [ 33932: 33932] Allocate a new trap: 0xc0030274d0 43 D0307 22:52:17.217577 340720 usertrap_amd64.go:225] [ 33932: 33932] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:17.224611 340720 usertrap_amd64.go:212] [ 33934: 33934] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:17.224732 340720 usertrap_amd64.go:122] [ 33934: 33934] Allocate a new trap: 0xc00826d800 41 D0307 22:52:17.224820 340720 usertrap_amd64.go:225] [ 33934: 33934] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:17.225172 340720 task_exit.go:204] [ 33932: 33932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.225554 340720 task_exit.go:204] [ 33932: 33932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.226361 340720 task_signals.go:204] [ 33932: 33936] Signal 33932, PID: 33936, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.226621 340720 task_exit.go:204] [ 33932: 33936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.230068 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.231247 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.231535 340720 task_exit.go:204] [ 33932: 33936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.231634 340720 task_exit.go:204] [ 33932: 33936] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.231795 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:17.232610 340720 task_exit.go:204] [ 33932: 33932] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r0, 0x0, 0x0) D0307 22:52:17.234199 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.234692 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.245125 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.245596 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.248774 340720 usertrap_amd64.go:212] [ 33933: 33933] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:17.248845 340720 usertrap_amd64.go:122] [ 33933: 33933] Allocate a new trap: 0xc0046375c0 43 D0307 22:52:17.248921 340720 usertrap_amd64.go:225] [ 33933: 33933] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:17.274052 340720 usertrap_amd64.go:212] [ 33934: 33934] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:17.274170 340720 usertrap_amd64.go:122] [ 33934: 33934] Allocate a new trap: 0xc00826d800 42 D0307 22:52:17.274240 340720 usertrap_amd64.go:225] [ 33934: 33934] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:17.281461 340720 task_exit.go:204] [ 33933: 33933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.281768 340720 task_exit.go:204] [ 33933: 33933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.282882 340720 task_signals.go:204] [ 33933: 33937] Signal 33933, PID: 33937, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.283047 340720 task_exit.go:204] [ 33933: 33937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.287486 340720 task_exit.go:204] [ 33933: 33937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.287559 340720 task_exit.go:204] [ 33933: 33937] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.287671 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:17.288509 340720 task_exit.go:204] [ 33933: 33933] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.298002 340720 usertrap_amd64.go:212] [ 33934: 33934] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:17.298092 340720 usertrap_amd64.go:122] [ 33934: 33934] Allocate a new trap: 0xc00826d800 43 D0307 22:52:17.298179 340720 usertrap_amd64.go:225] [ 33934: 33934] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:17.298371 340720 usertrap_amd64.go:212] [ 33938: 33938] Found the pattern at ip 55918ef08490:sysno 109 22:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) D0307 22:52:17.298526 340720 usertrap_amd64.go:122] [ 33938: 33938] Allocate a new trap: 0xc004f831d0 39 D0307 22:52:17.299639 340720 usertrap_amd64.go:225] [ 33938: 33938] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:17.303185 340720 usertrap_amd64.go:212] [ 33939: 33939] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:17.303297 340720 usertrap_amd64.go:122] [ 33939: 33939] Allocate a new trap: 0xc001055350 40 D0307 22:52:17.303527 340720 task_exit.go:204] [ 33934: 33934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.303778 340720 task_signals.go:204] [ 33934: 33940] Signal 33934, PID: 33940, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.303917 340720 task_exit.go:204] [ 33934: 33940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.304061 340720 usertrap_amd64.go:225] [ 33939: 33939] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:17.304354 340720 task_exit.go:204] [ 33934: 33934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.304565 340720 usertrap_amd64.go:212] [ 33938: 33938] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:17.304653 340720 usertrap_amd64.go:122] [ 33938: 33938] Allocate a new trap: 0xc004f831d0 40 D0307 22:52:17.304751 340720 usertrap_amd64.go:225] [ 33938: 33938] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:17.306850 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.307309 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.309930 340720 task_exit.go:204] [ 33934: 33940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.310001 340720 task_exit.go:204] [ 33934: 33940] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.310107 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 22:52:17 executing program 3: inotify_rm_watch(0xffffffffffffffff, 0x0) D0307 22:52:17.310838 340720 task_exit.go:204] [ 33934: 33934] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.312425 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.313020 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.316596 340720 usertrap_amd64.go:212] [ 33939: 33939] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:17.316669 340720 usertrap_amd64.go:122] [ 33939: 33939] Allocate a new trap: 0xc001055350 41 D0307 22:52:17.316744 340720 usertrap_amd64.go:225] [ 33939: 33939] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:17.319510 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.320198 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.331985 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.332595 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.345897 340720 usertrap_amd64.go:212] [ 33941: 33941] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:17.345987 340720 usertrap_amd64.go:122] [ 33941: 33941] Allocate a new trap: 0xc001bb7590 40 D0307 22:52:17.346761 340720 usertrap_amd64.go:225] [ 33941: 33941] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:17.348212 340720 usertrap_amd64.go:212] [ 33938: 33938] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:17.348317 340720 usertrap_amd64.go:122] [ 33938: 33938] Allocate a new trap: 0xc004f831d0 41 D0307 22:52:17.348385 340720 usertrap_amd64.go:225] [ 33938: 33938] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:17.352425 340720 usertrap_amd64.go:212] [ 33941: 33941] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:17.352498 340720 usertrap_amd64.go:122] [ 33941: 33941] Allocate a new trap: 0xc001bb7590 41 D0307 22:52:17.352924 340720 usertrap_amd64.go:225] [ 33941: 33941] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:17.358146 340720 usertrap_amd64.go:212] [ 33939: 33939] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:17.358272 340720 usertrap_amd64.go:122] [ 33939: 33939] Allocate a new trap: 0xc001055350 42 D0307 22:52:17.358372 340720 usertrap_amd64.go:225] [ 33939: 33939] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:17.359499 340720 usertrap_amd64.go:212] [ 33938: 33943] Found the pattern at ip 55918ee9527d:sysno 257 D0307 22:52:17.359606 340720 usertrap_amd64.go:122] [ 33938: 33943] Allocate a new trap: 0xc004f831d0 42 D0307 22:52:17.359747 340720 usertrap_amd64.go:225] [ 33938: 33943] Apply the binary patch addr 55918ee9527d trap addr 61d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:17.360647 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.361125 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.362653 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.363911 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.367323 340720 usertrap_amd64.go:212] [ 33942: 33942] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:17.367458 340720 usertrap_amd64.go:122] [ 33942: 33942] Allocate a new trap: 0xc000296570 40 D0307 22:52:17.368572 340720 usertrap_amd64.go:225] [ 33942: 33942] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:17.375326 340720 usertrap_amd64.go:212] [ 33938: 33938] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:17.375488 340720 usertrap_amd64.go:122] [ 33938: 33938] Allocate a new trap: 0xc004f831d0 43 D0307 22:52:17.375597 340720 usertrap_amd64.go:225] [ 33938: 33938] Apply the binary patch addr 55918ee94fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0307 22:52:17.376029 340720 usertrap_amd64.go:212] [ 33942: 33942] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:17.376180 340720 usertrap_amd64.go:122] [ 33942: 33942] Allocate a new trap: 0xc000296570 41 D0307 22:52:17.376297 340720 usertrap_amd64.go:225] [ 33942: 33942] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:17.382239 340720 usertrap_amd64.go:212] [ 33939: 33939] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:17.382308 340720 usertrap_amd64.go:122] [ 33939: 33939] Allocate a new trap: 0xc001055350 43 D0307 22:52:17.382383 340720 usertrap_amd64.go:225] [ 33939: 33939] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:17.383761 340720 usertrap_amd64.go:212] [ 33941: 33941] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:17.383850 340720 usertrap_amd64.go:122] [ 33941: 33941] Allocate a new trap: 0xc001bb7590 42 D0307 22:52:17.383962 340720 usertrap_amd64.go:225] [ 33941: 33941] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:17.384774 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.385507 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.385580 340720 task_exit.go:204] [ 33938: 33938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.385878 340720 task_signals.go:204] [ 33938: 33943] Signal 33938, PID: 33943, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.385940 340720 task_exit.go:204] [ 33938: 33938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.386330 340720 task_exit.go:204] [ 33938: 33943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.390056 340720 task_exit.go:204] [ 33938: 33943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.390109 340720 task_exit.go:204] [ 33938: 33943] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.390192 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:17.390543 340720 task_exit.go:204] [ 33938: 33938] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) D0307 22:52:17.394006 340720 task_exit.go:204] [ 33939: 33939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.394557 340720 task_signals.go:204] [ 33939: 33944] Signal 33939, PID: 33944, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.394735 340720 task_exit.go:204] [ 33939: 33944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.395297 340720 task_exit.go:204] [ 33939: 33944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.395415 340720 task_exit.go:204] [ 33939: 33944] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.400079 340720 task_exit.go:204] [ 33939: 33939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.400220 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:17.401500 340720 task_exit.go:204] [ 33939: 33939] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.407201 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.407969 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0x0) D0307 22:52:17.409599 340720 usertrap_amd64.go:212] [ 33941: 33941] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:17.409734 340720 usertrap_amd64.go:122] [ 33941: 33941] Allocate a new trap: 0xc001bb7590 43 D0307 22:52:17.409874 340720 usertrap_amd64.go:225] [ 33941: 33941] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:17.410830 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.411222 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.429140 340720 task_exit.go:204] [ 33941: 33941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.429497 340720 task_exit.go:204] [ 33941: 33941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.430195 340720 task_signals.go:204] [ 33941: 33945] Signal 33941, PID: 33945, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.430673 340720 task_exit.go:204] [ 33941: 33945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.436108 340720 task_exit.go:204] [ 33941: 33945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.436234 340720 task_exit.go:204] [ 33941: 33945] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.436380 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:17.437227 340720 task_exit.go:204] [ 33941: 33941] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.439424 340720 usertrap_amd64.go:212] [ 33942: 33942] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:17.439633 340720 usertrap_amd64.go:122] [ 33942: 33942] Allocate a new trap: 0xc000296570 42 D0307 22:52:17.439757 340720 usertrap_amd64.go:225] [ 33942: 33942] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) 22:52:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) D0307 22:52:17.443369 340720 usertrap_amd64.go:212] [ 33946: 33946] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:17.443816 340720 usertrap_amd64.go:122] [ 33946: 33946] Allocate a new trap: 0xc004637a70 39 D0307 22:52:17.444406 340720 usertrap_amd64.go:225] [ 33946: 33946] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:17.447151 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.448051 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.452672 340720 usertrap_amd64.go:212] [ 33946: 33946] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:17.452798 340720 usertrap_amd64.go:122] [ 33946: 33946] Allocate a new trap: 0xc004637a70 40 D0307 22:52:17.453009 340720 usertrap_amd64.go:225] [ 33946: 33946] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:17.455832 340720 usertrap_amd64.go:212] [ 33942: 33942] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:17.455943 340720 usertrap_amd64.go:122] [ 33942: 33942] Allocate a new trap: 0xc000296570 43 D0307 22:52:17.456016 340720 usertrap_amd64.go:225] [ 33942: 33942] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:17.459717 340720 usertrap_amd64.go:212] [ 33947: 33947] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:17.459861 340720 usertrap_amd64.go:122] [ 33947: 33947] Allocate a new trap: 0xc001055530 40 D0307 22:52:17.460144 340720 task_exit.go:204] [ 33942: 33942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.460368 340720 usertrap_amd64.go:225] [ 33947: 33947] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:17.460380 340720 task_signals.go:204] [ 33942: 33948] Signal 33942, PID: 33948, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.460543 340720 task_exit.go:204] [ 33942: 33942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.460801 340720 task_exit.go:204] [ 33942: 33948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.462367 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.462812 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.463807 340720 usertrap_amd64.go:212] [ 33947: 33947] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:17.463990 340720 usertrap_amd64.go:122] [ 33947: 33947] Allocate a new trap: 0xc001055530 41 D0307 22:52:17.464115 340720 usertrap_amd64.go:225] [ 33947: 33947] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:17.465580 340720 task_exit.go:204] [ 33942: 33948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.465690 340720 task_exit.go:204] [ 33942: 33948] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.466000 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:17.467592 340720 task_exit.go:204] [ 33942: 33942] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.470349 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} 22:52:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x19, 0x0, &(0x7f0000000040)=0x22) D0307 22:52:17.470988 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.492152 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.492182 340720 usertrap_amd64.go:212] [ 33946: 33946] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:17.492297 340720 usertrap_amd64.go:122] [ 33946: 33946] Allocate a new trap: 0xc004637a70 41 D0307 22:52:17.492424 340720 usertrap_amd64.go:225] [ 33946: 33946] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:17.492600 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.497683 340720 usertrap_amd64.go:212] [ 33947: 33947] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:17.497759 340720 usertrap_amd64.go:122] [ 33947: 33947] Allocate a new trap: 0xc001055530 42 D0307 22:52:17.497856 340720 usertrap_amd64.go:225] [ 33947: 33947] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:17.505383 340720 usertrap_amd64.go:212] [ 33946: 33950] Found the pattern at ip 55918ee9527d:sysno 257 D0307 22:52:17.505517 340720 usertrap_amd64.go:122] [ 33946: 33950] Allocate a new trap: 0xc004637a70 42 D0307 22:52:17.505603 340720 usertrap_amd64.go:225] [ 33946: 33950] Apply the binary patch addr 55918ee9527d trap addr 61d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:17.506405 340720 usertrap_amd64.go:212] [ 33949: 33949] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:17.506509 340720 usertrap_amd64.go:122] [ 33949: 33949] Allocate a new trap: 0xc003027650 40 D0307 22:52:17.506708 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.507032 340720 usertrap_amd64.go:225] [ 33949: 33949] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:17.507189 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.509769 340720 usertrap_amd64.go:212] [ 33949: 33949] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:17.509854 340720 usertrap_amd64.go:122] [ 33949: 33949] Allocate a new trap: 0xc003027650 41 D0307 22:52:17.509955 340720 usertrap_amd64.go:225] [ 33949: 33949] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:17.515840 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.516180 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.519249 340720 usertrap_amd64.go:212] [ 33947: 33947] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:17.519452 340720 usertrap_amd64.go:122] [ 33947: 33947] Allocate a new trap: 0xc001055530 43 D0307 22:52:17.519551 340720 usertrap_amd64.go:225] [ 33947: 33947] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:17.529427 340720 task_exit.go:204] [ 33947: 33947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.529702 340720 task_signals.go:204] [ 33947: 33951] Signal 33947, PID: 33951, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.529827 340720 task_exit.go:204] [ 33947: 33951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.530005 340720 task_exit.go:204] [ 33947: 33947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.534821 340720 task_exit.go:204] [ 33947: 33951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.535010 340720 task_exit.go:204] [ 33947: 33951] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.535159 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:17.535834 340720 task_exit.go:204] [ 33947: 33947] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0x0) D0307 22:52:17.541213 340720 usertrap_amd64.go:212] [ 33946: 33946] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:17.541349 340720 usertrap_amd64.go:122] [ 33946: 33946] Allocate a new trap: 0xc004637a70 43 D0307 22:52:17.541540 340720 usertrap_amd64.go:225] [ 33946: 33946] Apply the binary patch addr 55918ee94fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0307 22:52:17.545521 340720 usertrap_amd64.go:212] [ 33952: 33952] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:17.545887 340720 usertrap_amd64.go:122] [ 33952: 33952] Allocate a new trap: 0xc0002967b0 40 D0307 22:52:17.546337 340720 task_exit.go:204] [ 33946: 33946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.546575 340720 task_signals.go:204] [ 33946: 33950] Signal 33946, PID: 33950, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.547092 340720 task_exit.go:204] [ 33946: 33946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.547222 340720 task_exit.go:204] [ 33946: 33950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.547413 340720 usertrap_amd64.go:225] [ 33952: 33952] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:17.547801 340720 usertrap_amd64.go:212] [ 33949: 33949] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:17.548143 340720 usertrap_amd64.go:122] [ 33949: 33949] Allocate a new trap: 0xc003027650 42 D0307 22:52:17.548240 340720 usertrap_amd64.go:225] [ 33949: 33949] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:17.551377 340720 task_exit.go:204] [ 33946: 33950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.551857 340720 task_exit.go:204] [ 33946: 33950] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.552046 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:17.552263 340720 task_exit.go:204] [ 33946: 33946] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.553197 340720 usertrap_amd64.go:212] [ 33952: 33952] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:17.553288 340720 usertrap_amd64.go:122] [ 33952: 33952] Allocate a new trap: 0xc0002967b0 41 D0307 22:52:17.553363 340720 usertrap_amd64.go:225] [ 33952: 33952] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:17.553682 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.554386 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} 22:52:17 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) D0307 22:52:17.557569 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.557917 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.561842 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.562164 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.568331 340720 usertrap_amd64.go:212] [ 33949: 33949] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:17.568425 340720 usertrap_amd64.go:122] [ 33949: 33949] Allocate a new trap: 0xc003027650 43 D0307 22:52:17.568538 340720 usertrap_amd64.go:225] [ 33949: 33949] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:17.572216 340720 task_exit.go:204] [ 33949: 33949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.572426 340720 task_signals.go:204] [ 33949: 33953] Signal 33949, PID: 33953, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.572527 340720 task_exit.go:204] [ 33949: 33953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.573060 340720 task_exit.go:204] [ 33949: 33953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.573125 340720 task_exit.go:204] [ 33949: 33953] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.577006 340720 task_exit.go:204] [ 33949: 33949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.577143 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:17.577421 340720 task_exit.go:204] [ 33949: 33949] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) D0307 22:52:17.587950 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.588392 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.588871 340720 usertrap_amd64.go:212] [ 33952: 33952] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:17.589103 340720 usertrap_amd64.go:122] [ 33952: 33952] Allocate a new trap: 0xc0002967b0 42 D0307 22:52:17.589176 340720 usertrap_amd64.go:225] [ 33952: 33952] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) D0307 22:52:17.602411 340720 usertrap_amd64.go:212] [ 33955: 33955] Found the pattern at ip 55918ef08490:sysno 109 D0307 22:52:17.602552 340720 usertrap_amd64.go:122] [ 33955: 33955] Allocate a new trap: 0xc002c02f30 39 D0307 22:52:17.603103 340720 usertrap_amd64.go:225] [ 33955: 33955] Apply the binary patch addr 55918ef08490 trap addr 61c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 28 6 0]) D0307 22:52:17.606747 340720 usertrap_amd64.go:212] [ 33955: 33955] Found the pattern at ip 55918eee2a30:sysno 266 D0307 22:52:17.606820 340720 usertrap_amd64.go:122] [ 33955: 33955] Allocate a new trap: 0xc002c02f30 40 D0307 22:52:17.606896 340720 usertrap_amd64.go:225] [ 33955: 33955] Apply the binary patch addr 55918eee2a30 trap addr 61c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 28 6 0]) D0307 22:52:17.608777 340720 usertrap_amd64.go:212] [ 33952: 33952] Found the pattern at ip 55e7d8feafa4:sysno 3 D0307 22:52:17.608885 340720 usertrap_amd64.go:122] [ 33952: 33952] Allocate a new trap: 0xc0002967b0 43 D0307 22:52:17.609000 340720 usertrap_amd64.go:225] [ 33952: 33952] Apply the binary patch addr 55e7d8feafa4 trap addr 68d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 141 6 0]) D0307 22:52:17.609584 340720 usertrap_amd64.go:212] [ 33954: 33954] Found the pattern at ip 5577607a1490:sysno 109 D0307 22:52:17.609708 340720 usertrap_amd64.go:122] [ 33954: 33954] Allocate a new trap: 0xc00826dc50 40 D0307 22:52:17.610445 340720 usertrap_amd64.go:225] [ 33954: 33954] Apply the binary patch addr 5577607a1490 trap addr 6ac80 ([184 109 0 0 0 15 5] -> [255 36 37 128 172 6 0]) D0307 22:52:17.613956 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.614115 340720 task_exit.go:204] [ 33952: 33952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.614411 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.614518 340720 task_signals.go:204] [ 33952: 33956] Signal 33952, PID: 33956, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.614615 340720 task_exit.go:204] [ 33952: 33952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.615840 340720 task_exit.go:204] [ 33952: 33956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.619251 340720 usertrap_amd64.go:212] [ 33954: 33954] Found the pattern at ip 55776077ba30:sysno 266 D0307 22:52:17.619343 340720 usertrap_amd64.go:122] [ 33954: 33954] Allocate a new trap: 0xc00826dc50 41 D0307 22:52:17.619457 340720 usertrap_amd64.go:225] [ 33954: 33954] Apply the binary patch addr 55776077ba30 trap addr 6acd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 172 6 0]) D0307 22:52:17.622423 340720 task_exit.go:204] [ 33952: 33956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.622618 340720 task_exit.go:204] [ 33952: 33956] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.622766 340720 task_signals.go:443] [ 56200: 56200] Discarding ignored signal 17 D0307 22:52:17.624465 340720 task_exit.go:204] [ 33952: 33952] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x19, 0x0, &(0x7f0000000040)=0x22) D0307 22:52:17.625956 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.626994 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.634688 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.635132 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.639241 340720 usertrap_amd64.go:212] [ 33957: 33957] Found the pattern at ip 55def6d7d490:sysno 109 D0307 22:52:17.639360 340720 usertrap_amd64.go:122] [ 33957: 33957] Allocate a new trap: 0xc0002ef740 40 D0307 22:52:17.639898 340720 usertrap_amd64.go:225] [ 33957: 33957] Apply the binary patch addr 55def6d7d490 trap addr 69c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 156 6 0]) D0307 22:52:17.643716 340720 usertrap_amd64.go:212] [ 33957: 33957] Found the pattern at ip 55def6d57a30:sysno 266 D0307 22:52:17.643835 340720 usertrap_amd64.go:122] [ 33957: 33957] Allocate a new trap: 0xc0002ef740 41 D0307 22:52:17.643969 340720 usertrap_amd64.go:225] [ 33957: 33957] Apply the binary patch addr 55def6d57a30 trap addr 69cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 156 6 0]) D0307 22:52:17.647137 340720 usertrap_amd64.go:212] [ 33955: 33955] Found the pattern at ip 55918eee451a:sysno 56 D0307 22:52:17.647207 340720 usertrap_amd64.go:122] [ 33955: 33955] Allocate a new trap: 0xc002c02f30 41 D0307 22:52:17.647287 340720 usertrap_amd64.go:225] [ 33955: 33955] Apply the binary patch addr 55918eee451a trap addr 61cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 28 6 0]) D0307 22:52:17.649004 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.649562 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.663256 340720 usertrap_amd64.go:212] [ 33955: 33958] Found the pattern at ip 55918ee9527d:sysno 257 D0307 22:52:17.663370 340720 usertrap_amd64.go:122] [ 33955: 33958] Allocate a new trap: 0xc002c02f30 42 D0307 22:52:17.663503 340720 usertrap_amd64.go:225] [ 33955: 33958] Apply the binary patch addr 55918ee9527d trap addr 61d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 29 6 0]) D0307 22:52:17.663574 340720 usertrap_amd64.go:212] [ 33954: 33954] Found the pattern at ip 55776077d51a:sysno 56 D0307 22:52:17.663631 340720 usertrap_amd64.go:122] [ 33954: 33954] Allocate a new trap: 0xc00826dc50 42 D0307 22:52:17.663742 340720 usertrap_amd64.go:225] [ 33954: 33954] Apply the binary patch addr 55776077d51a trap addr 6ad20 ([184 56 0 0 0 15 5] -> [255 36 37 32 173 6 0]) D0307 22:52:17.663749 340720 usertrap_amd64.go:212] [ 33957: 33957] Found the pattern at ip 55def6d5951a:sysno 56 D0307 22:52:17.663947 340720 usertrap_amd64.go:122] [ 33957: 33957] Allocate a new trap: 0xc0002ef740 42 D0307 22:52:17.664054 340720 usertrap_amd64.go:225] [ 33957: 33957] Apply the binary patch addr 55def6d5951a trap addr 69d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 157 6 0]) D0307 22:52:17.665076 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.666680 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.688194 340720 usertrap_amd64.go:212] [ 33954: 33954] Found the pattern at ip 55776072dfa4:sysno 3 D0307 22:52:17.688305 340720 usertrap_amd64.go:122] [ 33954: 33954] Allocate a new trap: 0xc00826dc50 43 D0307 22:52:17.688412 340720 usertrap_amd64.go:225] [ 33954: 33954] Apply the binary patch addr 55776072dfa4 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0307 22:52:17.689540 340720 usertrap_amd64.go:212] [ 33955: 33955] Found the pattern at ip 55918ee94fa4:sysno 3 D0307 22:52:17.689739 340720 usertrap_amd64.go:212] [ 33959: 33959] Found the pattern at ip 55e7d905e490:sysno 109 D0307 22:52:17.689855 340720 usertrap_amd64.go:122] [ 33959: 33959] Allocate a new trap: 0xc0002968d0 40 D0307 22:52:17.690352 340720 usertrap_amd64.go:225] [ 33959: 33959] Apply the binary patch addr 55e7d905e490 trap addr 68c80 ([184 109 0 0 0 15 5] -> [255 36 37 128 140 6 0]) D0307 22:52:17.689744 340720 usertrap_amd64.go:122] [ 33955: 33955] Allocate a new trap: 0xc002c02f30 43 D0307 22:52:17.691281 340720 usertrap_amd64.go:225] [ 33955: 33955] Apply the binary patch addr 55918ee94fa4 trap addr 61d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 29 6 0]) D0307 22:52:17.692787 340720 usertrap_amd64.go:212] [ 33957: 33957] Found the pattern at ip 55def6d09fa4:sysno 3 D0307 22:52:17.692890 340720 usertrap_amd64.go:122] [ 33957: 33957] Allocate a new trap: 0xc0002ef740 43 D0307 22:52:17.693016 340720 usertrap_amd64.go:225] [ 33957: 33957] Apply the binary patch addr 55def6d09fa4 trap addr 69d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 157 6 0]) D0307 22:52:17.694455 340720 task_exit.go:204] [ 33954: 33954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.694817 340720 task_exit.go:204] [ 33954: 33954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.695002 340720 task_exit.go:204] [ 33955: 33955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.695124 340720 usertrap_amd64.go:212] [ 33959: 33959] Found the pattern at ip 55e7d9038a30:sysno 266 D0307 22:52:17.695215 340720 usertrap_amd64.go:122] [ 33959: 33959] Allocate a new trap: 0xc0002968d0 41 D0307 22:52:17.695302 340720 usertrap_amd64.go:225] [ 33959: 33959] Apply the binary patch addr 55e7d9038a30 trap addr 68cd0 ([184 10 1 0 0 15 5] -> [255 36 37 208 140 6 0]) D0307 22:52:17.695294 340720 task_exit.go:204] [ 33955: 33955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.696377 340720 task_signals.go:204] [ 33955: 33958] Signal 33955, PID: 33958, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.696514 340720 task_exit.go:204] [ 33955: 33958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.696992 340720 task_signals.go:204] [ 33954: 33960] Signal 33954, PID: 33960, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.697221 340720 task_exit.go:204] [ 33954: 33960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.698361 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, proc, ]} D0307 22:52:17.699619 340720 task_exit.go:204] [ 33957: 33957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.699798 340720 task_signals.go:204] [ 33957: 33961] Signal 33957, PID: 33961, TID: 0, fault addr: 0x9: terminating thread group D0307 22:52:17.700007 340720 task_exit.go:204] [ 33957: 33961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0307 22:52:17.701360 340720 task_exit.go:204] [ 33957: 33957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.702107 340720 task_exit.go:204] [ 33955: 33958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.702269 340720 task_exit.go:204] [ 33955: 33958] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.703050 340720 task_signals.go:443] [ 1658: 1658] Discarding ignored signal 17 D0307 22:52:17.703266 340720 task_exit.go:204] [ 33955: 33955] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) D0307 22:52:17.707306 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.707495 340720 task_exit.go:204] [ 33957: 33961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.707572 340720 task_exit.go:204] [ 33957: 33961] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.707699 340720 task_signals.go:443] [ 1656: 1656] Discarding ignored signal 17 D0307 22:52:17.708197 340720 task_exit.go:204] [ 33954: 33960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0307 22:52:17.708340 340720 task_exit.go:204] [ 33954: 33960] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.708458 340720 task_signals.go:443] [ 1657: 1657] Discarding ignored signal 17 D0307 22:52:17.709026 340720 task_exit.go:204] [ 33957: 33957] Transitioning from exit state TaskExitZombie to TaskExitDead D0307 22:52:17.709239 340720 task_exit.go:204] [ 33954: 33954] Transitioning from exit state TaskExitZombie to TaskExitDead 22:52:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0x0) 22:52:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) D0307 22:52:17.717282 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.717765 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.720620 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.721107 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.721557 340720 client.go:400] send [channel 0xc00047c1b0] WalkReq{DirFD: 1, Path: [, dev, ]} D0307 22:52:17.721892 340720 client.go:400] recv [channel 0xc00047c1b0] WalkStatResp{Stats: [{Mask:2047 Blksize:4096 Attributes:0 Nlink:3 UID:0 GID:0 Mode:16895 _:0 Ino:13636667 Size:4096 Blocks:8 AttributesMask:0 Atime:{Sec:1678226967 Nsec:634322731 _:0} Btime:{Sec:0 Nsec:0 _:0} Ctime:{Sec:1678226971 Nsec:602318780 _:0} Mtime:{Sec:1678226971 Nsec:602318780 _:0} RdevMajor:0 RdevMinor:0 DevMajor:8 DevMinor:16}]} D0307 22:52:17.731783 340720 usertrap_amd64.go:212] [ 33959: 33959] Found the pattern at ip 55e7d903a51a:sysno 56 D0307 22:52:17.731894 340720 usertrap_amd64.go:122] [ 33959: 33959] Allocate a new trap: 0xc0002968d0 42 D0307 22:52:17.732035 340720 usertrap_amd64.go:225] [ 33959: 33959] Apply the binary patch addr 55e7d903a51a trap addr 68d20 ([184 56 0 0 0 15 5] -> [255 36 37 32 141 6 0]) ================== WARNING: DATA RACE Write at 0x00c0065b8434 by goroutine 3664001: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*subprocessPool).fetchAvailable() pkg/sentry/platform/systrap/subprocess_pool.go:74 +0x248 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess() pkg/sentry/platform/systrap/subprocess.go:249 +0x64 gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*Systrap).NewAddressSpace() pkg/sentry/platform/systrap/systrap.go:364 +0x6e gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).NewAddressSpace() :1 +0x77 gvisor.dev/gvisor/pkg/sentry/mm.(*MemoryManager).Activate() pkg/sentry/mm/address_space.go:86 +0x13a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Activate() pkg/sentry/kernel/task_usermem.go:39 +0x59 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:70 +0x2e4 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Previous read at 0x00c0065b8434 by goroutine 3663778: gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*subprocess).unregisterContext() pkg/sentry/platform/systrap/subprocess.go:971 +0xd7 gvisor.dev/gvisor/pkg/sentry/platform/systrap.(*context).Release() pkg/sentry/platform/systrap/systrap.go:286 +0x95 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:101 +0x51a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Goroutine 3664001 (running) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:377 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9b8 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:265 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:94 +0x36a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 Goroutine 3663778 (finished) created at: gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:377 +0x1ac gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Clone.func7() pkg/sentry/kernel/task_clone.go:258 +0x44 runtime.deferreturn() GOROOT/src/runtime/panic.go:476 +0x32 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:216 +0x144 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_clone_amd64.go:36 +0x4d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:142 +0x9b8 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:322 +0x7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:282 +0x8e gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:257 +0x4c4 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:265 +0x1d4a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:94 +0x36a gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x47 ================== W0307 22:52:18.053244 340845 util.go:64] FATAL ERROR: waiting on pid 8: waiting on PID 8 in sandbox "ci-gvisor-systrap-1-race-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 8: waiting on PID 8 in sandbox "ci-gvisor-systrap-1-race-0": urpc method "containerManager.WaitPID" failed: EOF W0307 22:52:18.053605 340845 main.go:267] Failure to execute command, err: 1 W0307 22:52:18.086641 340697 sandbox.go:1003] Wait RPC to container "ci-gvisor-systrap-1-race-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0307 22:52:18.088608 1 connection.go:127] sock read failed, closing connection: EOF D0307 22:52:18.089112 340697 container.go:736] Destroy container, cid: ci-gvisor-systrap-1-race-0 D0307 22:52:18.089249 340697 container.go:976] Destroying container, cid: ci-gvisor-systrap-1-race-0 D0307 22:52:18.089311 340697 sandbox.go:1290] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-0 D0307 22:52:18.089349 340697 sandbox.go:1045] Destroying sandbox "ci-gvisor-systrap-1-race-0" D0307 22:52:18.089474 340697 container.go:990] Killing gofer for container, cid: ci-gvisor-systrap-1-race-0, PID: 340717 I0307 22:52:18.104092 340697 main.go:258] Exiting with status: 16896 VM DIAGNOSIS: I0307 22:52:17.852966 893945 main.go:222] *************************** I0307 22:52:17.853068 893945 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0307 22:52:17.853139 893945 main.go:224] Version 0.0.0 I0307 22:52:17.853175 893945 main.go:225] GOOS: linux I0307 22:52:17.853203 893945 main.go:226] GOARCH: amd64 I0307 22:52:17.853235 893945 main.go:227] PID: 893945 I0307 22:52:17.853260 893945 main.go:228] UID: 0, GID: 0 I0307 22:52:17.853284 893945 main.go:229] Configuration: I0307 22:52:17.853316 893945 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0307 22:52:17.853341 893945 main.go:231] Platform: systrap I0307 22:52:17.853373 893945 main.go:232] FileAccess: shared I0307 22:52:17.853414 893945 main.go:233] Directfs: false I0307 22:52:17.853447 893945 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0307 22:52:17.853475 893945 main.go:236] Network: sandbox, logging: false I0307 22:52:17.853505 893945 main.go:237] Strace: false, max size: 1024, syscalls: I0307 22:52:17.853530 893945 main.go:238] IOURING: false I0307 22:52:17.853561 893945 main.go:239] Debug: true I0307 22:52:17.853585 893945 main.go:240] Systemd: false I0307 22:52:17.853624 893945 main.go:241] *************************** W0307 22:52:17.853648 893945 main.go:246] Block the TERM signal. This is only safe in tests! D0307 22:52:17.853735 893945 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0307 22:52:17.878989 893945 util.go:51] Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000532f0'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000532f0'], PID: %!d(MISSING) I0307 22:52:17.879141 893945 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0307 22:52:17.879200 893945 sandbox.go:1208] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0307 22:52:17.879502 893945 sandbox.go:557] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0307 22:52:17.880064 893945 urpc.go:568] urpc: successfully marshalled 36 bytes. W0307 22:52:18.053295 893945 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0307 22:52:18.053617 893945 main.go:267] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-0"]: exit status 128 I0307 22:52:17.852966 893945 main.go:222] *************************** I0307 22:52:17.853068 893945 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0307 22:52:17.853139 893945 main.go:224] Version 0.0.0 I0307 22:52:17.853175 893945 main.go:225] GOOS: linux I0307 22:52:17.853203 893945 main.go:226] GOARCH: amd64 I0307 22:52:17.853235 893945 main.go:227] PID: 893945 I0307 22:52:17.853260 893945 main.go:228] UID: 0, GID: 0 I0307 22:52:17.853284 893945 main.go:229] Configuration: I0307 22:52:17.853316 893945 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0307 22:52:17.853341 893945 main.go:231] Platform: systrap I0307 22:52:17.853373 893945 main.go:232] FileAccess: shared I0307 22:52:17.853414 893945 main.go:233] Directfs: false I0307 22:52:17.853447 893945 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0307 22:52:17.853475 893945 main.go:236] Network: sandbox, logging: false I0307 22:52:17.853505 893945 main.go:237] Strace: false, max size: 1024, syscalls: I0307 22:52:17.853530 893945 main.go:238] IOURING: false I0307 22:52:17.853561 893945 main.go:239] Debug: true I0307 22:52:17.853585 893945 main.go:240] Systemd: false I0307 22:52:17.853624 893945 main.go:241] *************************** W0307 22:52:17.853648 893945 main.go:246] Block the TERM signal. This is only safe in tests! D0307 22:52:17.853735 893945 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0307 22:52:17.878989 893945 util.go:51] Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000532f0'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-race-0" '\U000532f0'], PID: %!d(MISSING) I0307 22:52:17.879141 893945 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0307 22:52:17.879200 893945 sandbox.go:1208] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0307 22:52:17.879502 893945 sandbox.go:557] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0307 22:52:17.880064 893945 urpc.go:568] urpc: successfully marshalled 36 bytes. W0307 22:52:18.053295 893945 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: urpc method "debug.Stacks" failed: connection reset by peer W0307 22:52:18.053617 893945 main.go:267] Failure to execute command, err: 1 [168946.449801] exe[60424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168946.615958] exe[186225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.375106] warn_bad_vsyscall: 76 callbacks suppressed [168949.375109] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.416145] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.453297] exe[850016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.485738] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.517349] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.558267] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.596536] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.629400] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.660988] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [168949.691957] exe[186189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555963f93506 cs:33 sp:7f2e0c4d18e8 ax:ffffffffff600000 si:7f2e0c4d1e08 di:ffffffffff600000 [169036.927775] warn_bad_vsyscall: 35 callbacks suppressed [169036.927778] exe[338789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169037.269917] exe[338914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194def90 ax:7fd0194df020 si:ffffffffff600000 di:5649c221d263 [169038.044881] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.073755] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.096842] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.123016] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.145543] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.178658] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.221852] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169038.270254] exe[338474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649c2153378 cs:33 sp:7fd0194fff90 ax:7fd019500020 si:ffffffffff600000 di:5649c221d263 [169227.686320] warn_bad_vsyscall: 25 callbacks suppressed [169227.686323] exe[453441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cce300b506 cs:33 sp:7fc1672db8e8 ax:ffffffffff600000 si:7fc1672dbe08 di:ffffffffff600000 [169228.313757] exe[198846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cce300b506 cs:33 sp:7fc1672db8e8 ax:ffffffffff600000 si:7fc1672dbe08 di:ffffffffff600000 [169253.270823] exe[290067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55680be92506 cs:33 sp:7f96715e28e8 ax:ffffffffff600000 si:7f96715e2e08 di:ffffffffff600000 [169257.401656] exe[327999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd51f95506 cs:33 sp:7f32fe2308e8 ax:ffffffffff600000 si:7f32fe230e08 di:ffffffffff600000 [169263.081680] exe[255671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600c8167506 cs:33 sp:7f7e96bcf8e8 ax:ffffffffff600000 si:7f7e96bcfe08 di:ffffffffff600000 [169275.647588] exe[979345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56413cb13506 cs:33 sp:7f5669d748e8 ax:ffffffffff600000 si:7f5669d74e08 di:ffffffffff600000 [169284.382482] exe[477337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589296f6506 cs:33 sp:7fbf4be688e8 ax:ffffffffff600000 si:7fbf4be68e08 di:ffffffffff600000 [169285.772045] exe[338814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e2bd06506 cs:33 sp:7f3ef1d2e8e8 ax:ffffffffff600000 si:7f3ef1d2ee08 di:ffffffffff600000 [169314.731484] exe[491245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559320d66506 cs:33 sp:7f9fe3b4d8e8 ax:ffffffffff600000 si:7f9fe3b4de08 di:ffffffffff600000 [169320.281714] exe[554205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ecafc3506 cs:33 sp:7eeb17a238e8 ax:ffffffffff600000 si:7eeb17a23e08 di:ffffffffff600000 [169330.725311] exe[452551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f46454506 cs:33 sp:7f95b2de18e8 ax:ffffffffff600000 si:7f95b2de1e08 di:ffffffffff600000 [169367.206643] exe[432445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e5744506 cs:33 sp:7f536faeb8e8 ax:ffffffffff600000 si:7f536faebe08 di:ffffffffff600000 [169406.643519] exe[572037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2f03a3506 cs:33 sp:7ef6273468e8 ax:ffffffffff600000 si:7ef627346e08 di:ffffffffff600000 [170044.298945] exe[510928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bfe8e8 ax:ffffffffff600000 si:7f9ee9bfee08 di:ffffffffff600000 [170044.704137] exe[92486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.727335] exe[92486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.752961] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.780606] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.809611] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.831736] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.857228] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.883372] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170044.909237] exe[92321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587d405c506 cs:33 sp:7f9ee9bdd8e8 ax:ffffffffff600000 si:7f9ee9bdde08 di:ffffffffff600000 [170493.292225] warn_bad_vsyscall: 57 callbacks suppressed [170493.292230] exe[816628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c38a24a506 cs:33 sp:7ede2c3f18e8 ax:ffffffffff600000 si:7ede2c3f1e08 di:ffffffffff600000 [171041.713772] exe[393822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ca2ba378 cs:33 sp:7efdccb6ef90 ax:7efdccb6f020 si:ffffffffff600000 di:5577ca384263 [171042.093675] exe[470080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ca2ba378 cs:33 sp:7efdccb6ef90 ax:7efdccb6f020 si:ffffffffff600000 di:5577ca384263 [171042.958482] exe[765112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ca2ba378 cs:33 sp:7efdccb6ef90 ax:7efdccb6f020 si:ffffffffff600000 di:5577ca384263 [171918.815274] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171919.575942] exe[908891] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171920.148749] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171920.807187] exe[999905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171921.606102] exe[992736] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171922.237220] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [171922.930467] exe[993816] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [172144.719154] exe[1881] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172145.372524] exe[4068] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172145.905896] exe[5454] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172146.527420] exe[28148] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [172468.053386] exe[261110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [172468.268980] exe[273562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [172468.469811] exe[261137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [172468.629216] exe[274835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cb5bef506 cs:33 sp:7f0f9724b8e8 ax:ffffffffff600000 si:7f0f9724be08 di:ffffffffff600000 [173040.816649] exe[227165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173041.317059] exe[227279] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173041.769832] exe[227165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173042.245073] exe[250517] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173043.014001] exe[227165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173043.530728] exe[250517] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173044.047524] exe[240963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [173131.612071] exe[343463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173131.785866] exe[416466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173131.800520] exe[335845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1a7cf7506 cs:33 sp:7f6b0f8788e8 ax:ffffffffff600000 si:7f6b0f878e08 di:ffffffffff600000 [173132.215188] exe[334984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173132.285987] exe[338997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1a7cf7506 cs:33 sp:7f6b0f8788e8 ax:ffffffffff600000 si:7f6b0f878e08 di:ffffffffff600000 [173132.387754] exe[358692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558907f0c506 cs:33 sp:7f1cb4cf08e8 ax:ffffffffff600000 si:7f1cb4cf0e08 di:ffffffffff600000 [173132.470053] exe[336609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1a7cf7506 cs:33 sp:7f6b0f8788e8 ax:ffffffffff600000 si:7f6b0f878e08 di:ffffffffff600000 [173132.484221] exe[448335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6bbc0d506 cs:33 sp:7fc54b6c48e8 ax:ffffffffff600000 si:7fc54b6c4e08 di:ffffffffff600000 [173132.512239] exe[427139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606af7f0506 cs:33 sp:7f3ab3b538e8 ax:ffffffffff600000 si:7f3ab3b53e08 di:ffffffffff600000 [173132.678853] exe[427139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6bbc0d506 cs:33 sp:7fc54b6c48e8 ax:ffffffffff600000 si:7fc54b6c4e08 di:ffffffffff600000 [173628.024742] warn_bad_vsyscall: 3 callbacks suppressed [173628.024745] exe[355956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ac7e40378 cs:33 sp:7f16bb861f90 ax:7f16bb862020 si:ffffffffff600000 di:559ac7f0a263 [174840.681003] exe[708897] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174841.246327] exe[550478] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174841.825158] exe[550478] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174842.383946] exe[550478] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [174976.929891] exe[682467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1feedd506 cs:33 sp:7f88a30a88e8 ax:ffffffffff600000 si:7f88a30a8e08 di:ffffffffff600000 [175857.213999] exe[314060] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175858.287508] exe[316729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175859.125825] exe[879442] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175860.043996] exe[314060] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [175861.255976] exe[879442] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [175862.193266] exe[940673] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [175863.268432] exe[316729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [175863.835149] exe[157540] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [176175.080745] exe[421036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [176175.739393] exe[421036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [176175.954523] exe[420801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [176176.353498] exe[420752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55819506f506 cs:33 sp:7f4e27dd88e8 ax:ffffffffff600000 si:7f4e27dd8e08 di:ffffffffff600000 [177333.313263] exe[229084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177333.546932] exe[208712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177334.147017] exe[481732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177334.429691] exe[208774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455c808506 cs:33 sp:7f7fc91fe8e8 ax:ffffffffff600000 si:7f7fc91fee08 di:ffffffffff600000 [177730.200848] exe[311330] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [177840.436307] exe[652143] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [177843.844718] exe[646796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c871dba506 cs:33 sp:7fd89b99e8e8 ax:ffffffffff600000 si:7fd89b99ee08 di:ffffffffff600000 [178339.863828] exe[409685] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [178409.752058] exe[552921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178410.277201] exe[617654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178410.594467] exe[548431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178411.079829] exe[552576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aa38bc506 cs:33 sp:7f306721f8e8 ax:ffffffffff600000 si:7f306721fe08 di:ffffffffff600000 [178935.476197] exe[518476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558860d6a506 cs:33 sp:7f0a0cb488e8 ax:ffffffffff600000 si:7f0a0cb48e08 di:ffffffffff600000 [179151.464014] exe[94841] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [179371.853931] exe[964090] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [179849.661067] exe[114599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c6c679506 cs:33 sp:7f6b2988b8e8 ax:ffffffffff600000 si:7f6b2988be08 di:ffffffffff600000 [179995.237892] exe[806612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572ae07e378 cs:33 sp:7f5eb4e63f90 ax:7f5eb4e64020 si:ffffffffff600000 di:5572ae148263 [179995.602010] exe[921478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572ae07e378 cs:33 sp:7f5eb4e21f90 ax:7f5eb4e22020 si:ffffffffff600000 di:5572ae148263 [179995.931983] exe[812582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572ae07e378 cs:33 sp:7f5eb4e63f90 ax:7f5eb4e64020 si:ffffffffff600000 di:5572ae148263 [180662.041519] exe[340469] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [181906.241923] exe[499669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e548e8 ax:ffffffffff600000 si:7f6937e54e08 di:ffffffffff600000 [181906.548516] exe[506783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e548e8 ax:ffffffffff600000 si:7f6937e54e08 di:ffffffffff600000 [181906.570079] exe[413189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e338e8 ax:ffffffffff600000 si:7f6937e33e08 di:ffffffffff600000 [181907.037805] exe[420831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa0c8506 cs:33 sp:7f6937e548e8 ax:ffffffffff600000 si:7f6937e54e08 di:ffffffffff600000 [182498.091758] exe[111615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182498.597514] exe[418026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182499.262906] exe[490058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182499.627831] exe[451356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586d5841506 cs:33 sp:7f9ac9f168e8 ax:ffffffffff600000 si:7f9ac9f16e08 di:ffffffffff600000 [182842.403731] exe[440192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d774378 cs:33 sp:7feea9262f90 ax:7feea9263020 si:ffffffffff600000 di:55557d83e263 [183451.140556] exe[981425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556785f4f506 cs:33 sp:7f0e2b1b98e8 ax:ffffffffff600000 si:7f0e2b1b9e08 di:ffffffffff600000 [184885.805304] exe[365993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c80f88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [184885.929010] exe[366036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c5ff88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [184886.110827] exe[366064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c80f88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [184886.112399] exe[366081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55812e022506 cs:33 sp:7ef479c5ff88 ax:ffffffffff600000 si:20001a00 di:ffffffffff600000 [185671.103121] exe[569032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185671.376301] exe[569112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185671.480497] exe[569112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185671.779139] exe[569233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ec48e8 ax:ffffffffff600000 si:7ec670ec4e08 di:ffffffffff600000 [185672.858407] exe[569516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.078294] exe[569580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.320555] exe[569643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.551148] exe[569710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.712189] exe[569748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [185673.880560] exe[569788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ad12a506 cs:33 sp:7ec670ee58e8 ax:ffffffffff600000 si:7ec670ee5e08 di:ffffffffff600000 [187299.955550] warn_bad_vsyscall: 9 callbacks suppressed [187299.955553] exe[945970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21bd23506 cs:33 sp:7f29667558e8 ax:ffffffffff600000 si:7f2966755e08 di:ffffffffff600000 [187300.650467] exe[904172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21bd23506 cs:33 sp:7f29667558e8 ax:ffffffffff600000 si:7f2966755e08 di:ffffffffff600000 [187300.977581] exe[903832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21bd23506 cs:33 sp:7f29667558e8 ax:ffffffffff600000 si:7f2966755e08 di:ffffffffff600000 [188918.887779] exe[138082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9b78e8 ax:ffffffffff600000 si:7fc8fa9b7e08 di:ffffffffff600000 [188919.253834] exe[207828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9b78e8 ax:ffffffffff600000 si:7fc8fa9b7e08 di:ffffffffff600000 [188919.293441] exe[207828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9968e8 ax:ffffffffff600000 si:7fc8fa996e08 di:ffffffffff600000 [188919.563498] exe[126800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d4af13506 cs:33 sp:7fc8fa9b78e8 ax:ffffffffff600000 si:7fc8fa9b7e08 di:ffffffffff600000 [190173.934429] exe[237234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc1d4d506 cs:33 sp:7f5ea4fbd8e8 ax:ffffffffff600000 si:7f5ea4fbde08 di:ffffffffff600000 [190174.927934] exe[260781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc1d4d506 cs:33 sp:7f5ea4fde8e8 ax:ffffffffff600000 si:7f5ea4fdee08 di:ffffffffff600000 [190176.308406] exe[260594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc1d4d506 cs:33 sp:7f5ea4f9c8e8 ax:ffffffffff600000 si:7f5ea4f9ce08 di:ffffffffff600000 [190799.753960] exe[646283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078666d8e8 ax:ffffffffff600000 si:7f078666de08 di:ffffffffff600000 [190800.469206] exe[625808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078666d8e8 ax:ffffffffff600000 si:7f078666de08 di:ffffffffff600000 [190801.180013] exe[607488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078664c8e8 ax:ffffffffff600000 si:7f078664ce08 di:ffffffffff600000 [190801.191491] exe[616472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564816ad4506 cs:33 sp:7f078666d8e8 ax:ffffffffff600000 si:7f078666de08 di:ffffffffff600000 [194657.536988] exe[441514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119ce2f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [194657.866039] exe[441600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119ce2f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [194657.883600] exe[441611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119cc1f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [194658.201967] exe[441677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558958ac2506 cs:33 sp:7eb119ce2f88 ax:ffffffffff600000 si:20006e00 di:ffffffffff600000 [198344.942151] exe[976003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6a68e8 ax:ffffffffff600000 si:7f325e6a6e08 di:ffffffffff600000 [198345.999370] exe[37673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6a68e8 ax:ffffffffff600000 si:7f325e6a6e08 di:ffffffffff600000 [198347.231724] exe[997743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6a68e8 ax:ffffffffff600000 si:7f325e6a6e08 di:ffffffffff600000 [198347.231841] exe[997787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629ed64c506 cs:33 sp:7f325e6858e8 ax:ffffffffff600000 si:7f325e685e08 di:ffffffffff600000 [198726.048900] exe[99916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.132499] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.154347] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.178194] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.201505] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.222624] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.244387] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.268009] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.290416] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198726.318678] exe[99926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88edff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.414983] warn_bad_vsyscall: 57 callbacks suppressed [198741.414986] exe[102569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.496672] exe[102575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.572587] exe[102584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.670080] exe[102594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.756074] exe[102603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.846796] exe[102610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198741.930766] exe[102620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198742.002050] exe[102628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198742.075560] exe[102636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [198742.172833] exe[102651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555827d88506 cs:33 sp:7ebf88f00f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [200726.590503] warn_bad_vsyscall: 3 callbacks suppressed [200726.590506] exe[963990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e16de0506 cs:33 sp:7f8d0feacf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [200726.746279] exe[214221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e16de0506 cs:33 sp:7f8d0feacf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [200726.913309] exe[967671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e16de0506 cs:33 sp:7f8d0feacf88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [204570.334146] exe[142478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a55142e506 cs:33 sp:7ebae5e9c8e8 ax:ffffffffff600000 si:7ebae5e9ce08 di:ffffffffff600000 [205676.166119] exe[408851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f88e32d378 cs:33 sp:7f72736e9f90 ax:7f72736ea020 si:ffffffffff600000 di:55f88e3f7263 [205682.569708] exe[433504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754d0a4378 cs:33 sp:7f86413fdf90 ax:7f86413fe020 si:ffffffffff600000 di:55754d16e263 [205693.378069] exe[431448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bcb42b378 cs:33 sp:7f28d1d32f90 ax:7f28d1d33020 si:ffffffffff600000 di:555bcb4f5263 [205750.027755] exe[463220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576d14e9378 cs:33 sp:7f55bee60f90 ax:7f55bee61020 si:ffffffffff600000 di:5576d15b3263 [205753.681930] exe[350429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5fdf7f378 cs:33 sp:7f46535c5f90 ax:7f46535c6020 si:ffffffffff600000 di:55e5fe049263 [205764.208091] exe[456381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc97325378 cs:33 sp:7f567b7c4f90 ax:7f567b7c5020 si:ffffffffff600000 di:55cc973ef263 [205811.260817] exe[473180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a11d42378 cs:33 sp:7f9d8f23df90 ax:7f9d8f23e020 si:ffffffffff600000 di:562a11e0c263 [205874.008752] exe[494169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ddb3d7d378 cs:33 sp:7ed2f3271f90 ax:7ed2f3272020 si:ffffffffff600000 di:55ddb3e47263 [205876.879613] exe[494921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2d4d37378 cs:33 sp:7ef47b9fef90 ax:7ef47b9ff020 si:ffffffffff600000 di:55d2d4e01263 [205881.915785] exe[496300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563aa8ad4378 cs:33 sp:7ea0a04ecf90 ax:7ea0a04ed020 si:ffffffffff600000 di:563aa8b9e263 [205956.686771] exe[515804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555a3941378 cs:33 sp:7f1543c37f90 ax:7f1543c38020 si:ffffffffff600000 di:5555a3a0b263 [205996.440831] exe[526788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5513df378 cs:33 sp:7ebae5e9cf90 ax:7ebae5e9d020 si:ffffffffff600000 di:55a5514a9263 [206337.549308] exe[459955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9be46c378 cs:33 sp:7f56fd0a3f90 ax:7f56fd0a4020 si:ffffffffff600000 di:55d9be536263 [206631.388445] exe[655612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56002c505378 cs:33 sp:7f932ef40f90 ax:7f932ef41020 si:ffffffffff600000 di:56002c5cf263 [206668.822056] exe[623897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d6ab8e8 ax:ffffffffff600000 si:7f3f6d6abe08 di:ffffffffff600000 [206669.935683] exe[623425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d6ab8e8 ax:ffffffffff600000 si:7f3f6d6abe08 di:ffffffffff600000 [206669.935709] exe[530668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d68a8e8 ax:ffffffffff600000 si:7f3f6d68ae08 di:ffffffffff600000 [206671.930542] exe[400126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a26e41d506 cs:33 sp:7f3f6d68a8e8 ax:ffffffffff600000 si:7f3f6d68ae08 di:ffffffffff600000 [207593.587250] exe[883360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd438e8 ax:ffffffffff600000 si:7fc83fd43e08 di:ffffffffff600000 [207594.051514] exe[745666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd438e8 ax:ffffffffff600000 si:7fc83fd43e08 di:ffffffffff600000 [207594.052406] exe[745719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd228e8 ax:ffffffffff600000 si:7fc83fd22e08 di:ffffffffff600000 [207594.397158] exe[773493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55843db88506 cs:33 sp:7fc83fd438e8 ax:ffffffffff600000 si:7fc83fd43e08 di:ffffffffff600000 [208740.525989] exe[120767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133fe8e8 ax:ffffffffff600000 si:7ea2133fee08 di:ffffffffff600000 [208740.985809] exe[120856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133fe8e8 ax:ffffffffff600000 si:7ea2133fee08 di:ffffffffff600000 [208741.049120] exe[120876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133dd8e8 ax:ffffffffff600000 si:7ea2133dde08 di:ffffffffff600000 [208741.373066] exe[120935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589a4523506 cs:33 sp:7ea2133fe8e8 ax:ffffffffff600000 si:7ea2133fee08 di:ffffffffff600000 [209828.396382] exe[264046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d00eb3d378 cs:33 sp:7f15a2977f90 ax:7f15a2978020 si:ffffffffff600000 di:55d00ec07263 [210141.154719] exe[203969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9e1734378 cs:33 sp:7fd5595eef90 ax:7fd5595ef020 si:ffffffffff600000 di:55f9e17fe263 [211063.194735] exe[678365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56207ab05506 cs:33 sp:7ebd5458b8e8 ax:ffffffffff600000 si:7ebd5458be08 di:ffffffffff600000 [211063.423928] exe[678419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56207ab05506 cs:33 sp:7ebd5458b8e8 ax:ffffffffff600000 si:7ebd5458be08 di:ffffffffff600000 [211063.619883] exe[678473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56207ab05506 cs:33 sp:7ebd5456a8e8 ax:ffffffffff600000 si:7ebd5456ae08 di:ffffffffff600000 [211095.175260] exe[686047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211095.290619] exe[686075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211095.544870] exe[686126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211095.908271] exe[686206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [211096.098565] exe[686240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55673b8ec506 cs:33 sp:7ed405f1e8e8 ax:ffffffffff600000 si:7ed405f1ee08 di:ffffffffff600000 [213443.794397] exe[139183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9ffe5c506 cs:33 sp:7f05703758e8 ax:ffffffffff600000 si:7f0570375e08 di:ffffffffff600000 [213444.352004] exe[139397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9ffe5c506 cs:33 sp:7f05703758e8 ax:ffffffffff600000 si:7f0570375e08 di:ffffffffff600000 [213444.860271] exe[195835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9ffe5c506 cs:33 sp:7f05703758e8 ax:ffffffffff600000 si:7f0570375e08 di:ffffffffff600000 [217366.583437] exe[261663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [217366.791446] exe[261710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [217367.046569] exe[261760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [217367.331595] exe[261831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a27a266506 cs:33 sp:7ef97dbb88e8 ax:ffffffffff600000 si:7ef97dbb8e08 di:ffffffffff600000 [219958.747296] exe[874429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d9725c506 cs:33 sp:7eea7a7928e8 ax:ffffffffff600000 si:7eea7a792e08 di:ffffffffff600000 [220086.664723] exe[779583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220087.097414] exe[778740] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220087.499824] exe[779859] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220087.968417] exe[781638] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220088.346851] exe[779859] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220088.768374] exe[780931] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [220089.210175] exe[792974] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [221810.266757] exe[269945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221810.470493] exe[89821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221810.479228] exe[244064] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [221810.609987] exe[78473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221810.762127] exe[143789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5d3620506 cs:33 sp:7f777da348e8 ax:ffffffffff600000 si:7f777da34e08 di:ffffffffff600000 [221811.072692] exe[963463] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [221811.714084] exe[683772] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [221812.265564] exe[663052] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [222843.605144] exe[645079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [222843.829000] exe[645020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [222844.125589] exe[538784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [222844.428748] exe[563758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee05008506 cs:33 sp:7fcdab6948e8 ax:ffffffffff600000 si:7fcdab694e08 di:ffffffffff600000 [223817.164327] exe[667321] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [223817.782342] exe[650521] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [223818.332853] exe[653745] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [223818.862109] exe[653745] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224278.085925] exe[992121] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224278.722242] exe[540084] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224279.372038] exe[541734] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224280.119712] exe[540830] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224330.586549] exe[522098] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224331.239786] exe[991983] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224331.839449] exe[674602] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224332.369172] exe[636274] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [224888.960331] exe[127554] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [224921.584213] exe[593221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [225217.171334] exe[109143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225217.471576] exe[163862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225217.741925] exe[156673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225218.012202] exe[120092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56461866a506 cs:33 sp:7f98beef38e8 ax:ffffffffff600000 si:7f98beef3e08 di:ffffffffff600000 [225344.174881] exe[36384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623f459a506 cs:33 sp:7ff0389de8e8 ax:ffffffffff600000 si:7ff0389dee08 di:ffffffffff600000 [225776.565288] exe[248511] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [225801.198074] exe[284676] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225802.052800] exe[339071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225802.730940] exe[339071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225803.521859] exe[284676] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [225978.796560] exe[138414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56126c455506 cs:33 sp:7f7ad3d2d8e8 ax:ffffffffff600000 si:7f7ad3d2de08 di:ffffffffff600000 [226135.007325] exe[261441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226135.303946] exe[118362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226135.706770] exe[915513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226135.963541] exe[120483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [226229.293320] exe[180158] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [227098.698674] exe[116560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227099.140651] exe[914707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227099.630206] exe[946956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227099.783774] exe[261496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547c62f506 cs:33 sp:7fb93dcbb8e8 ax:ffffffffff600000 si:7fb93dcbbe08 di:ffffffffff600000 [227100.151391] exe[266265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227100.337034] exe[138381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547c62f506 cs:33 sp:7fb93dcbb8e8 ax:ffffffffff600000 si:7fb93dcbbe08 di:ffffffffff600000 [227100.610798] exe[946956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227100.762634] exe[224451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547c62f506 cs:33 sp:7fb93dcbb8e8 ax:ffffffffff600000 si:7fb93dcbbe08 di:ffffffffff600000 [227100.822363] exe[116542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621bf374506 cs:33 sp:7f6bc51408e8 ax:ffffffffff600000 si:7f6bc5140e08 di:ffffffffff600000 [227100.989272] exe[222482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d668b506 cs:33 sp:7effa473b8e8 ax:ffffffffff600000 si:7effa473be08 di:ffffffffff600000 [227140.459501] warn_bad_vsyscall: 3 callbacks suppressed [227140.459504] exe[467130] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [227446.891686] exe[680623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d67844506 cs:33 sp:7f50b91a68e8 ax:ffffffffff600000 si:7f50b91a6e08 di:ffffffffff600000 [228706.640918] exe[298891] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [229273.533232] exe[958020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac8ce3c378 cs:33 sp:7f713a276f90 ax:7f713a277020 si:ffffffffff600000 di:55ac8cf06263 [229758.670777] exe[744232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac8ce8b506 cs:33 sp:7f713a2768e8 ax:ffffffffff600000 si:7f713a276e08 di:ffffffffff600000 [230673.617566] exe[7693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d685c7b378 cs:33 sp:7fe39dc79f90 ax:7fe39dc7a020 si:ffffffffff600000 di:55d685d45263 [230721.501141] exe[759723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4551eb506 cs:33 sp:7fac29f558e8 ax:ffffffffff600000 si:7fac29f55e08 di:ffffffffff600000 [237240.248608] exe[344405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556503293506 cs:33 sp:7f5710728f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237240.887345] exe[349199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556503293506 cs:33 sp:7f57106e6f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237241.303721] exe[352629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556503293506 cs:33 sp:7f5710749f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237672.717749] exe[738844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f4106719f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.092461] exe[749407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.681000] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.719573] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.782490] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.823981] exe[742460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.871562] exe[742460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.939954] exe[742460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237673.996755] exe[738065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [237674.029809] exe[742705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5dba66506 cs:33 sp:7f41066d7f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [239030.582046] warn_bad_vsyscall: 20 callbacks suppressed [239030.582049] exe[334598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e62c6b4506 cs:33 sp:7f18069e9f88 ax:ffffffffff600000 si:20000d00 di:ffffffffff600000 [239031.300605] exe[305091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e62c6b4506 cs:33 sp:7f18069e9f88 ax:ffffffffff600000 si:20000d00 di:ffffffffff600000 [239032.090353] exe[300573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e62c6b4506 cs:33 sp:7f18069e9f88 ax:ffffffffff600000 si:20000d00 di:ffffffffff600000 [240112.234432] exe[605848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f138657af88 ax:ffffffffff600000 si:20005680 di:ffffffffff600000 [240243.946509] exe[668490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b517bfb378 cs:33 sp:7fd0ca083f90 ax:7fd0ca084020 si:ffffffffff600000 di:55b517cc5263 [240244.185338] exe[635080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b517bfb378 cs:33 sp:7fd0ca083f90 ax:7fd0ca084020 si:ffffffffff600000 di:55b517cc5263 [240244.550870] exe[653368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b517bfb378 cs:33 sp:7fd0c9bfef90 ax:7fd0c9bff020 si:ffffffffff600000 di:55b517cc5263 [240598.278274] exe[668490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563dec1d9378 cs:33 sp:7f019543df90 ax:7f019543e020 si:ffffffffff600000 di:563dec2a3263 [240598.491121] exe[623955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563dec1d9378 cs:33 sp:7f019543df90 ax:7f019543e020 si:ffffffffff600000 di:563dec2a3263 [240598.648928] exe[655747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563dec1d9378 cs:33 sp:7f019543df90 ax:7f019543e020 si:ffffffffff600000 di:563dec2a3263 [240732.765884] exe[686378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [240732.906901] exe[794541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [240733.117117] exe[606303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [240733.154787] exe[794319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b16ae506 cs:33 sp:7f13865fe8e8 ax:ffffffffff600000 si:7f13865fee08 di:ffffffffff600000 [241514.906755] exe[651132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc07ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [241515.515078] exe[617403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc07ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [241516.342813] exe[681867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc07ff88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [241516.350312] exe[916209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602926f1506 cs:33 sp:7ff5bc05ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [243003.402548] exe[618135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989e906506 cs:33 sp:7ffaec8df8e8 ax:ffffffffff600000 si:7ffaec8dfe08 di:ffffffffff600000 [243004.085203] exe[605712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989e906506 cs:33 sp:7ffaec8be8e8 ax:ffffffffff600000 si:7ffaec8bee08 di:ffffffffff600000 [243004.584166] exe[610522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989e906506 cs:33 sp:7ffaec87c8e8 ax:ffffffffff600000 si:7ffaec87ce08 di:ffffffffff600000 [243742.411167] exe[498250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587d68e8 ax:ffffffffff600000 si:7fd9587d6e08 di:ffffffffff600000 [243742.671726] exe[492458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.786573] exe[500905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.822219] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.880046] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.919908] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.954202] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243742.980531] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243743.029380] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [243743.051169] exe[500732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc4e6a506 cs:33 sp:7fd9587b58e8 ax:ffffffffff600000 si:7fd9587b5e08 di:ffffffffff600000 [244828.600933] warn_bad_vsyscall: 57 callbacks suppressed [244828.600937] exe[622496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39ac68101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:12224000 [244829.059521] exe[621172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39ac68101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:12224000 [244829.361298] exe[621160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f39ac68101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:12224000 [247277.253613] exe[801227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826b78e8 ax:ffffffffff600000 si:7ff7826b7e08 di:ffffffffff600000 [247277.601387] exe[769808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826b78e8 ax:ffffffffff600000 si:7ff7826b7e08 di:ffffffffff600000 [247277.608445] exe[769590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826968e8 ax:ffffffffff600000 si:7ff782696e08 di:ffffffffff600000 [247277.988064] exe[771041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d48ff1506 cs:33 sp:7ff7826b78e8 ax:ffffffffff600000 si:7ff7826b7e08 di:ffffffffff600000 [251960.766815] exe[509011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030151f506 cs:33 sp:7efa886f78e8 ax:ffffffffff600000 si:7efa886f7e08 di:ffffffffff600000 [251960.934442] exe[509049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030151f506 cs:33 sp:7efa886f78e8 ax:ffffffffff600000 si:7efa886f7e08 di:ffffffffff600000 [251961.095344] exe[509088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030151f506 cs:33 sp:7efa886f78e8 ax:ffffffffff600000 si:7efa886f7e08 di:ffffffffff600000 [252008.255129] exe[519268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.418357] exe[519304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.644357] exe[519354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.784956] exe[519393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252008.930740] exe[519425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252009.085447] exe[519456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252009.281698] exe[519502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31fbdd506 cs:33 sp:7ee0e86438e8 ax:ffffffffff600000 si:7ee0e8643e08 di:ffffffffff600000 [252886.134590] exe[714576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf6c0d9506 cs:33 sp:7ec8fe2418e8 ax:ffffffffff600000 si:7ec8fe241e08 di:ffffffffff600000 [252886.390269] exe[714636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf6c0d9506 cs:33 sp:7ec8fe2418e8 ax:ffffffffff600000 si:7ec8fe241e08 di:ffffffffff600000 [252886.776034] exe[714680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf6c0d9506 cs:33 sp:7ec8fe2418e8 ax:ffffffffff600000 si:7ec8fe241e08 di:ffffffffff600000 [253531.362427] exe[858924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [253532.614859] exe[859449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [253533.472669] exe[860883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [253534.461865] exe[861061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d965d33101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80840000 [258892.410661] exe[946863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.826336] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.860441] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.884815] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.909925] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.939613] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258892.973494] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258893.003833] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258893.028789] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [258893.057488] exe[924622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5432b7378 cs:33 sp:7fa5c73fef90 ax:7fa5c73ff020 si:ffffffffff600000 di:55c543381263 [260240.826360] warn_bad_vsyscall: 25 callbacks suppressed [260240.826364] exe[301521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [260241.340398] exe[361933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [260241.418387] exe[361294] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [260241.892899] exe[301195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559cb53d2506 cs:33 sp:7f984bdda8e8 ax:ffffffffff600000 si:7f984bddae08 di:ffffffffff600000 [261648.629851] exe[728600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c74b79506 cs:33 sp:7eef7e987f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [261648.790508] exe[728644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c74b79506 cs:33 sp:7eef7e987f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [261649.177162] exe[728732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c74b79506 cs:33 sp:7eef7e987f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [264599.630215] exe[364615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [264599.791712] exe[364639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [264599.979813] exe[364665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [264600.193828] exe[364708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607dc2d0506 cs:33 sp:7ed1311fe8e8 ax:ffffffffff600000 si:7ed1311fee08 di:ffffffffff600000 [266107.041646] exe[509204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f284563a8e8 ax:ffffffffff600000 si:7f284563ae08 di:ffffffffff600000 [266107.625386] exe[521616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f284563a8e8 ax:ffffffffff600000 si:7f284563ae08 di:ffffffffff600000 [266107.658243] exe[590030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f28451dd8e8 ax:ffffffffff600000 si:7f28451dde08 di:ffffffffff600000 [266107.789763] exe[517153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7e632a506 cs:33 sp:7f28451fe8e8 ax:ffffffffff600000 si:7f28451fee08 di:ffffffffff600000 [267172.069406] exe[33190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [267172.296226] exe[33243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [267172.508115] exe[33282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [267172.724104] exe[33328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e913872506 cs:33 sp:7edae7b968e8 ax:ffffffffff600000 si:7edae7b96e08 di:ffffffffff600000 [268846.388707] exe[374434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268847.003069] exe[400364] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268847.607489] exe[376547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268848.125112] exe[363599] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268848.804028] exe[400812] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268849.308395] exe[400364] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [268849.828423] exe[400812] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [269054.507512] exe[66545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269055.280742] exe[375202] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269055.986048] exe[973128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269056.466798] exe[973128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269057.213052] exe[71625] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269057.733715] exe[375202] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269058.459832] exe[50169] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [269501.791204] exe[434807] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269502.619259] exe[431831] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269503.276246] exe[465588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269503.875606] exe[434717] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [269776.990139] exe[390233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.324461] exe[456314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.568237] exe[456562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ca62e0506 cs:33 sp:7f1cdc17a8e8 ax:ffffffffff600000 si:7f1cdc17ae08 di:ffffffffff600000 [269777.610443] exe[544717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.692516] exe[291996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581a2c2c506 cs:33 sp:7f432877d8e8 ax:ffffffffff600000 si:7f432877de08 di:ffffffffff600000 [269777.820620] exe[456265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ca62e0506 cs:33 sp:7f1cdc17a8e8 ax:ffffffffff600000 si:7f1cdc17ae08 di:ffffffffff600000 [269777.865858] exe[255885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b2ce49506 cs:33 sp:7fa2162eb8e8 ax:ffffffffff600000 si:7fa2162ebe08 di:ffffffffff600000 [269777.881428] exe[404759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b8c4e4506 cs:33 sp:7f48365db8e8 ax:ffffffffff600000 si:7f48365dbe08 di:ffffffffff600000 [269778.092280] exe[270588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581a2c2c506 cs:33 sp:7f432877d8e8 ax:ffffffffff600000 si:7f432877de08 di:ffffffffff600000 [269778.152404] exe[255838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ca62e0506 cs:33 sp:7f1cdc17a8e8 ax:ffffffffff600000 si:7f1cdc17ae08 di:ffffffffff600000 [270535.101375] warn_bad_vsyscall: 3 callbacks suppressed [270535.101377] exe[674547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270535.824811] exe[550615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270536.772723] exe[551913] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270537.516343] exe[674547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270538.516658] exe[568618] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270539.034799] exe[550615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270539.849793] exe[673369] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270855.503404] exe[729054] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270856.234283] exe[729054] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270857.158015] exe[730065] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270857.896990] exe[728122] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [270968.863206] exe[468353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [270969.561929] exe[453841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [270970.018912] exe[365060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [270970.525922] exe[479834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae7aa51506 cs:33 sp:7f3a7d3848e8 ax:ffffffffff600000 si:7f3a7d384e08 di:ffffffffff600000 [271044.112770] exe[463520] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271044.952563] exe[434945] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271045.851083] exe[812327] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271046.880727] exe[434945] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [271817.243371] exe[561218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271817.638305] exe[555431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271817.997300] exe[577976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271818.359816] exe[555766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [271942.616652] exe[993348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be46e27506 cs:33 sp:7ef30df0c8e8 ax:ffffffffff600000 si:7ef30df0ce08 di:ffffffffff600000 [271942.844347] exe[993396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be46e27506 cs:33 sp:7ef30df0c8e8 ax:ffffffffff600000 si:7ef30df0ce08 di:ffffffffff600000 [271943.043186] exe[993469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be46e27506 cs:33 sp:7ef30df0c8e8 ax:ffffffffff600000 si:7ef30df0ce08 di:ffffffffff600000 [272076.906926] exe[890867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55769fab0506 cs:33 sp:7fb698db88e8 ax:ffffffffff600000 si:7fb698db8e08 di:ffffffffff600000 [272095.594494] exe[949939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272095.815686] exe[949949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272095.975872] exe[14237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272096.101823] exe[949945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bca9dd506 cs:33 sp:7fc69f3218e8 ax:ffffffffff600000 si:7fc69f321e08 di:ffffffffff600000 [272479.228830] exe[94665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272479.361176] exe[44146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272479.560865] exe[41480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272479.718755] exe[70618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7163f506 cs:33 sp:7fb19da6b8e8 ax:ffffffffff600000 si:7fb19da6be08 di:ffffffffff600000 [272706.212554] exe[913785] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [272901.288739] exe[39003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f4e1d2506 cs:33 sp:7f9916d958e8 ax:ffffffffff600000 si:7f9916d95e08 di:ffffffffff600000 [272987.671117] exe[543783] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [273523.678625] exe[10259] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [273590.830162] exe[787583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [274356.976583] exe[588333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274357.793913] exe[588536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274357.866279] exe[588536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274358.063132] exe[588603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b6d8e8 ax:ffffffffff600000 si:7ed599b6de08 di:ffffffffff600000 [274358.099053] exe[588613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f7662a506 cs:33 sp:7ed599b4c8e8 ax:ffffffffff600000 si:7ed599b4ce08 di:ffffffffff600000 [275566.735752] exe[867748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f48e8 ax:ffffffffff600000 si:7fe3af4f4e08 di:ffffffffff600000 [275610.201844] exe[615569] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [276402.742032] exe[436452] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [276641.382908] exe[42182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [276641.560861] exe[948076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [276641.767781] exe[46280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581599a3506 cs:33 sp:7fe3af4f4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [277600.080872] exe[205595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7e9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [277600.348199] exe[205595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7e9f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [277600.448083] exe[173074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7c8f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [277600.660154] exe[193878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c366aa506 cs:33 sp:7fbd8a7c8f88 ax:ffffffffff600000 si:200001c0 di:ffffffffff600000 [278651.848834] exe[794070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564011c37506 cs:33 sp:7f862e2778e8 ax:ffffffffff600000 si:7f862e277e08 di:ffffffffff600000 [278914.516760] exe[636552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2553e5506 cs:33 sp:7f62869c98e8 ax:ffffffffff600000 si:7f62869c9e08 di:ffffffffff600000 [283222.671593] exe[306815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af82df88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283222.999293] exe[362388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.032219] exe[362388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.062041] exe[592215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.091830] exe[593614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.119116] exe[362388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.153160] exe[370178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.180661] exe[370178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.210581] exe[362720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283223.237996] exe[362720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b30092506 cs:33 sp:7f06af3ddf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [283650.563392] warn_bad_vsyscall: 57 callbacks suppressed [283650.563394] exe[291204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562907b8e506 cs:33 sp:7fb2b505df88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [283650.885504] exe[616939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562907b8e506 cs:33 sp:7fb2b505df88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [283651.137968] exe[616939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562907b8e506 cs:33 sp:7fb2b505df88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [284747.593248] exe[976776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570d3124506 cs:33 sp:7fcb8a67a8e8 ax:ffffffffff600000 si:7fcb8a67ae08 di:ffffffffff600000 [284748.550640] exe[723472] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570d3124506 cs:33 sp:7fcb8a6598e8 ax:ffffffffff600000 si:7fcb8a659e08 di:ffffffffff600000 [284749.553542] exe[690429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570d3124506 cs:33 sp:7fcb8a6598e8 ax:ffffffffff600000 si:7fcb8a659e08 di:ffffffffff600000 [286337.822160] exe[381278] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286338.467468] exe[381233] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286338.641553] exe[381233] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286339.131011] exe[381233] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [286339.342110] exe[129046] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [287119.268731] exe[541875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560db403d506 cs:33 sp:7ebaba72b8e8 ax:ffffffffff600000 si:7ebaba72be08 di:ffffffffff600000 [287119.422998] exe[541905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560db403d506 cs:33 sp:7ebaba72b8e8 ax:ffffffffff600000 si:7ebaba72be08 di:ffffffffff600000 [287119.928351] exe[542013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560db403d506 cs:33 sp:7ebaba72b8e8 ax:ffffffffff600000 si:7ebaba72be08 di:ffffffffff600000 [291492.981392] exe[316342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a1f83506 cs:33 sp:7ff412d688e8 ax:ffffffffff600000 si:7ff412d68e08 di:ffffffffff600000 [291493.505376] exe[316697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a1f83506 cs:33 sp:7ff412d688e8 ax:ffffffffff600000 si:7ff412d68e08 di:ffffffffff600000 [291493.939884] exe[334859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a1f83506 cs:33 sp:7ff412d688e8 ax:ffffffffff600000 si:7ff412d68e08 di:ffffffffff600000 [304309.558956] exe[168924] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1df4e506 cs:33 sp:7f8b54cbff88 ax:ffffffffff600000 si:20002100 di:ffffffffff600000 [304310.164026] exe[134021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1df4e506 cs:33 sp:7f8b54c9ef88 ax:ffffffffff600000 si:20002100 di:ffffffffff600000 [304310.816110] exe[120039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1df4e506 cs:33 sp:7f8b54cbff88 ax:ffffffffff600000 si:20002100 di:ffffffffff600000 [305557.230343] exe[756951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56535ab70506 cs:33 sp:7f7e043cc8e8 ax:ffffffffff600000 si:7f7e043cce08 di:ffffffffff600000 [305557.955700] exe[740887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56535ab70506 cs:33 sp:7f7e043cc8e8 ax:ffffffffff600000 si:7f7e043cce08 di:ffffffffff600000 [305558.246452] exe[740264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56535ab70506 cs:33 sp:7f7e0438a8e8 ax:ffffffffff600000 si:7f7e0438ae08 di:ffffffffff600000 [308214.771120] exe[654370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a74eb3d378 cs:33 sp:7f46a8afff90 ax:7f46a8b00020 si:ffffffffff600000 di:55a74ec07263 [308214.930941] exe[220620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a74eb3d378 cs:33 sp:7f46a8afff90 ax:7f46a8b00020 si:ffffffffff600000 di:55a74ec07263 [308215.034216] exe[666313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a74eb3d378 cs:33 sp:7f46a8adef90 ax:7f46a8adf020 si:ffffffffff600000 di:55a74ec07263 [314018.392693] exe[420894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314018.542019] exe[420923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314018.681221] exe[420947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314018.713790] exe[420947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.132682] exe[442781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.371345] exe[442826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.557266] exe[442867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.766261] exe[442910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314127.887886] exe[442933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.239332] exe[443007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.375505] exe[443034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.526485] exe[443062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.623355] exe[443079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [314128.760138] exe[443099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffa11d1378 cs:33 sp:7efb19e80f90 ax:7efb19e81020 si:ffffffffff600000 di:55ffa129b263 [315901.564428] warn_bad_vsyscall: 5 callbacks suppressed [315901.564433] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315902.592214] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315903.451300] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315904.162257] exe[795020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315904.721217] exe[795020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315905.488657] exe[795924] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [315906.050232] exe[795020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [316731.920819] exe[26454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7c2625506 cs:33 sp:7f6d549c18e8 ax:ffffffffff600000 si:7f6d549c1e08 di:ffffffffff600000 [316732.340623] exe[842372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7c2625506 cs:33 sp:7f6d549c18e8 ax:ffffffffff600000 si:7f6d549c1e08 di:ffffffffff600000 [316732.632289] exe[990692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7c2625506 cs:33 sp:7f6d549c18e8 ax:ffffffffff600000 si:7f6d549c1e08 di:ffffffffff600000 [317410.450053] exe[227650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317410.775487] exe[207302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317411.300393] exe[77120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317411.356928] exe[75913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef82402506 cs:33 sp:7fe9645658e8 ax:ffffffffff600000 si:7fe964565e08 di:ffffffffff600000 [317411.381251] exe[207072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3dfac4506 cs:33 sp:7f7acbe478e8 ax:ffffffffff600000 si:7f7acbe47e08 di:ffffffffff600000 [317411.431952] exe[96633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56555009e506 cs:33 sp:7f2c230508e8 ax:ffffffffff600000 si:7f2c23050e08 di:ffffffffff600000 [317411.605607] exe[75390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f6e2ab506 cs:33 sp:7fbfe55f38e8 ax:ffffffffff600000 si:7fbfe55f3e08 di:ffffffffff600000 [317411.679994] exe[228091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef82402506 cs:33 sp:7fe9645658e8 ax:ffffffffff600000 si:7fe964565e08 di:ffffffffff600000 [317411.753895] exe[115779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3dfac4506 cs:33 sp:7f7acbe478e8 ax:ffffffffff600000 si:7f7acbe47e08 di:ffffffffff600000 [317411.876140] exe[207998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56555009e506 cs:33 sp:7f2c230508e8 ax:ffffffffff600000 si:7f2c23050e08 di:ffffffffff600000 [317829.120326] warn_bad_vsyscall: 3 callbacks suppressed [317829.120329] exe[258250] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317829.615736] exe[975487] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317830.057748] exe[975487] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317830.567120] exe[228663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317831.085541] exe[975311] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317831.542964] exe[232746] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [317832.039231] exe[975311] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [318415.232253] exe[493718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [318415.405502] exe[493751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [318415.557862] exe[493786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [318415.730032] exe[493827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c5a780506 cs:33 sp:7ebeb7cc18e8 ax:ffffffffff600000 si:7ebeb7cc1e08 di:ffffffffff600000 [319085.856549] exe[310110] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319086.381364] exe[553926] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319086.890221] exe[312518] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319087.472472] exe[309615] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [319271.022465] exe[695425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319271.231194] exe[695476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319271.410572] exe[695515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319271.566906] exe[695559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed57b00506 cs:33 sp:7ea9bd4478e8 ax:ffffffffff600000 si:7ea9bd447e08 di:ffffffffff600000 [319952.827626] exe[845278] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [319953.649665] exe[797933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [319954.406857] exe[797933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [319955.041177] exe[797933] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [320726.866229] exe[52877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01aac3506 cs:33 sp:7eadb3d928e8 ax:ffffffffff600000 si:7eadb3d92e08 di:ffffffffff600000 [320726.962441] exe[52902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01aac3506 cs:33 sp:7eadb3d928e8 ax:ffffffffff600000 si:7eadb3d92e08 di:ffffffffff600000 [320727.121159] exe[52938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c01aac3506 cs:33 sp:7eadb3d928e8 ax:ffffffffff600000 si:7eadb3d92e08 di:ffffffffff600000 [321627.526842] exe[897524] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321628.036921] exe[897438] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321628.652962] exe[958177] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321629.264739] exe[897524] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [321989.483588] exe[166102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [321990.340963] exe[169275] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [321991.018513] exe[144093] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [321991.765754] exe[166102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [322299.844844] exe[345327] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [322364.801512] exe[332978] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [323167.418212] exe[788589] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [323397.864372] exe[246027] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [323511.410031] exe[366918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323511.905428] exe[293816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323512.333640] exe[667267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323512.717163] exe[296026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d04f84b506 cs:33 sp:7fd6e41858e8 ax:ffffffffff600000 si:7fd6e4185e08 di:ffffffffff600000 [323662.733119] exe[554723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323663.124199] exe[491452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323663.315434] exe[576664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323663.590856] exe[491578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e889c49506 cs:33 sp:7fab079fe8e8 ax:ffffffffff600000 si:7fab079fee08 di:ffffffffff600000 [323913.607059] exe[479329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aae2f2a506 cs:33 sp:7fec1dbf68e8 ax:ffffffffff600000 si:7fec1dbf6e08 di:ffffffffff600000 [324216.899705] exe[892705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324217.174356] exe[817985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324217.350690] exe[811842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324217.572374] exe[892072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba769ea506 cs:33 sp:7fc49831f8e8 ax:ffffffffff600000 si:7fc49831fe08 di:ffffffffff600000 [324261.457869] exe[908766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef93143a8e8 ax:ffffffffff600000 si:7ef93143ae08 di:ffffffffff600000 [324261.796712] exe[908820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef930ffe8e8 ax:ffffffffff600000 si:7ef930ffee08 di:ffffffffff600000 [324262.345523] exe[908938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef93143a8e8 ax:ffffffffff600000 si:7ef93143ae08 di:ffffffffff600000 [324262.375693] exe[908949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea6a7a0506 cs:33 sp:7ef930ffe8e8 ax:ffffffffff600000 si:7ef930ffee08 di:ffffffffff600000 [324490.425898] exe[745282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9a046506 cs:33 sp:7f93f5e4e8e8 ax:ffffffffff600000 si:7f93f5e4ee08 di:ffffffffff600000 [324739.900756] exe[933265] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [325657.889394] exe[153927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325658.058365] exe[154180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325658.412060] exe[217026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325658.547112] exe[155074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564755721506 cs:33 sp:7f732bd098e8 ax:ffffffffff600000 si:7f732bd09e08 di:ffffffffff600000 [325998.544232] exe[241545] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [327017.667383] exe[561874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563db3e05378 cs:33 sp:7f6529196f90 ax:7f6529197020 si:ffffffffff600000 di:563db3ecf263 [327053.596527] exe[481272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cedbde5378 cs:33 sp:7f38c175cf90 ax:7f38c175d020 si:ffffffffff600000 di:55cedbeaf263 [327064.957877] exe[588818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b0c2f5378 cs:33 sp:7ede03b0af90 ax:7ede03b0b020 si:ffffffffff600000 di:559b0c3bf263 [327081.439684] exe[516795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d3dc0d378 cs:33 sp:7f515b04df90 ax:7f515b04e020 si:ffffffffff600000 di:558d3dcd7263 [327149.256313] exe[465007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b74a8a4378 cs:33 sp:7f5b96659f90 ax:7f5b9665a020 si:ffffffffff600000 di:55b74a96e263 [327256.867260] exe[632097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba8a0fc378 cs:33 sp:7eac3bca5f90 ax:7eac3bca6020 si:ffffffffff600000 di:55ba8a1c6263 [327370.987013] exe[658201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fd82d6378 cs:33 sp:7ed0d209cf90 ax:7ed0d209d020 si:ffffffffff600000 di:557fd83a0263 [327480.681947] exe[663943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc62508378 cs:33 sp:7fa0e0855f90 ax:7fa0e0856020 si:ffffffffff600000 di:55cc625d2263 [327544.914642] exe[676084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815e87c378 cs:33 sp:7f2d27522f90 ax:7f2d27523020 si:ffffffffff600000 di:55815e946263 [327556.108801] exe[705212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a8e8e8378 cs:33 sp:7ed28d346f90 ax:7ed28d347020 si:ffffffffff600000 di:555a8e9b2263 [327663.961484] exe[723739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56251ffc0506 cs:33 sp:7f9763afc8e8 ax:ffffffffff600000 si:7f9763afce08 di:ffffffffff600000 [327881.734436] exe[691492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b08908f506 cs:33 sp:7f53d46688e8 ax:ffffffffff600000 si:7f53d4668e08 di:ffffffffff600000 [327927.043825] exe[776028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564ad7841378 cs:33 sp:7f304c586f90 ax:7f304c587020 si:ffffffffff600000 di:564ad790b263 [327940.783150] exe[715021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561dd0a40378 cs:33 sp:7ff343ed6f90 ax:7ff343ed7020 si:ffffffffff600000 di:561dd0b0a263 [328254.085040] exe[734320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f417c59378 cs:33 sp:7fa2838eff90 ax:7fa2838f0020 si:ffffffffff600000 di:55f417d23263 [328285.078592] exe[810905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b089040378 cs:33 sp:7f53d4668f90 ax:7f53d4669020 si:ffffffffff600000 di:55b08910a263 [328387.347841] exe[216802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc1ae37506 cs:33 sp:7fb37da9b8e8 ax:ffffffffff600000 si:7fb37da9be08 di:ffffffffff600000 [328917.366692] exe[955682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6b4a5a378 cs:33 sp:7f668a7aaf90 ax:7f668a7ab020 si:ffffffffff600000 di:55b6b4b24263 [329091.806545] exe[800851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bfdc97e378 cs:33 sp:7f3d51be9f90 ax:7f3d51bea020 si:ffffffffff600000 di:55bfdca48263 [330389.779984] exe[691797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d437508378 cs:33 sp:7f59bbd4af90 ax:7f59bbd4b020 si:ffffffffff600000 di:55d4375d2263 [330390.248077] exe[65074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d437508378 cs:33 sp:7f59bbd4af90 ax:7f59bbd4b020 si:ffffffffff600000 di:55d4375d2263 [330390.909464] exe[691834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d437508378 cs:33 sp:7f59bbd29f90 ax:7f59bbd2a020 si:ffffffffff600000 di:55d4375d2263 [331260.888333] exe[368442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331261.256223] exe[357979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595b8f88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331261.636409] exe[358063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331262.098037] exe[358026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [331262.470204] exe[358861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562805d1e506 cs:33 sp:7fa8595faf88 ax:ffffffffff600000 si:20000180 di:ffffffffff600000 [332759.732896] exe[637399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [332759.836450] exe[637399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [332759.934428] exe[259971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [332759.972948] exe[289764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8b3058506 cs:33 sp:7f8cd4ffe8e8 ax:ffffffffff600000 si:7f8cd4ffee08 di:ffffffffff600000 [334860.688139] exe[805356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562098fe506 cs:33 sp:7f43829fe8e8 ax:ffffffffff600000 si:7f43829fee08 di:ffffffffff600000 [334860.890172] exe[694922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562098fe506 cs:33 sp:7f43829fe8e8 ax:ffffffffff600000 si:7f43829fee08 di:ffffffffff600000 [334861.354456] exe[686534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562098fe506 cs:33 sp:7f43829dd8e8 ax:ffffffffff600000 si:7f43829dde08 di:ffffffffff600000 [341497.565186] exe[499745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754ee32506 cs:33 sp:7ecd6712f8e8 ax:ffffffffff600000 si:7ecd6712fe08 di:ffffffffff600000 [341497.774375] exe[499795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754ee32506 cs:33 sp:7ecd6712f8e8 ax:ffffffffff600000 si:7ecd6712fe08 di:ffffffffff600000 [341497.952894] exe[499832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754ee32506 cs:33 sp:7ecd6712f8e8 ax:ffffffffff600000 si:7ecd6712fe08 di:ffffffffff600000 [344620.374142] exe[689801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3db266506 cs:33 sp:7fe12d8a28e8 ax:ffffffffff600000 si:7fe12d8a2e08 di:ffffffffff600000 [344620.962216] exe[689720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3db266506 cs:33 sp:7fe12d8a28e8 ax:ffffffffff600000 si:7fe12d8a2e08 di:ffffffffff600000 [344621.483425] exe[695387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3db266506 cs:33 sp:7fe12d8a28e8 ax:ffffffffff600000 si:7fe12d8a2e08 di:ffffffffff600000 [345013.562828] exe[327493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fbacdf90 ax:7eb0fbace020 si:ffffffffff600000 di:55e600c14263 [345013.761298] exe[327525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fbaacf90 ax:7eb0fbaad020 si:ffffffffff600000 di:55e600c14263 [345013.975752] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.003760] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.036183] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.072354] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.102721] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.137275] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.170873] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345014.218241] exe[327569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e600b4a378 cs:33 sp:7eb0fba8bf90 ax:7eb0fba8c020 si:ffffffffff600000 di:55e600c14263 [345480.272409] warn_bad_vsyscall: 27 callbacks suppressed [345480.272413] exe[350010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831429e378 cs:33 sp:7fc1fbe83f90 ax:7fc1fbe84020 si:ffffffffff600000 di:558314368263 [345482.273805] exe[115861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831429e378 cs:33 sp:7fc1fbe83f90 ax:7fc1fbe84020 si:ffffffffff600000 di:558314368263 [345482.973548] exe[731146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831429e378 cs:33 sp:7fc1fbe83f90 ax:7fc1fbe84020 si:ffffffffff600000 di:558314368263 [348062.344421] exe[45218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55862c882378 cs:33 sp:7ec0ef8e9f90 ax:7ec0ef8ea020 si:ffffffffff600000 di:55862c94c263 [348062.518732] exe[45259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55862c882378 cs:33 sp:7ec0ef8e9f90 ax:7ec0ef8ea020 si:ffffffffff600000 di:55862c94c263 [348062.728454] exe[45304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55862c882378 cs:33 sp:7ec0ef8e9f90 ax:7ec0ef8ea020 si:ffffffffff600000 di:55862c94c263 [353851.241686] exe[594713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e4a93b506 cs:33 sp:7ead3d9fe8e8 ax:ffffffffff600000 si:7ead3d9fee08 di:ffffffffff600000 [353851.442576] exe[594759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e4a93b506 cs:33 sp:7ead3d9fe8e8 ax:ffffffffff600000 si:7ead3d9fee08 di:ffffffffff600000 [353853.688129] exe[595300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e4a93b506 cs:33 sp:7ead3d9fe8e8 ax:ffffffffff600000 si:7ead3d9fee08 di:ffffffffff600000 [353882.720681] exe[754175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a95bd6506 cs:33 sp:7f16986e88e8 ax:ffffffffff600000 si:7f16986e8e08 di:ffffffffff600000 [353883.319775] exe[23620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a95bd6506 cs:33 sp:7f16986e88e8 ax:ffffffffff600000 si:7f16986e8e08 di:ffffffffff600000 [353883.747256] exe[35589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a95bd6506 cs:33 sp:7f16986e88e8 ax:ffffffffff600000 si:7f16986e8e08 di:ffffffffff600000 [354050.241813] exe[645752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5e1716506 cs:33 sp:7fed711ed8e8 ax:ffffffffff600000 si:7fed711ede08 di:ffffffffff600000 [354051.015545] exe[641737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5e1716506 cs:33 sp:7fed711cc8e8 ax:ffffffffff600000 si:7fed711cce08 di:ffffffffff600000 [354051.177855] exe[645380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5e1716506 cs:33 sp:7fed711ab8e8 ax:ffffffffff600000 si:7fed711abe08 di:ffffffffff600000 [358646.280424] exe[596066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06b67506 cs:33 sp:7f7567f048e8 ax:ffffffffff600000 si:7f7567f04e08 di:ffffffffff600000 [358646.530899] exe[591684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06b67506 cs:33 sp:7f7567ee38e8 ax:ffffffffff600000 si:7f7567ee3e08 di:ffffffffff600000 [358646.706304] exe[598295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a06b67506 cs:33 sp:7f7567ee38e8 ax:ffffffffff600000 si:7f7567ee3e08 di:ffffffffff600000 [358731.321914] exe[654521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.630295] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.660582] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.698519] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.733215] exe[652625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.767574] exe[676480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.798800] exe[676480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.833235] exe[652640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.869582] exe[652640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [358731.904934] exe[652640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56471d049506 cs:33 sp:7f5c428318e8 ax:ffffffffff600000 si:7f5c42831e08 di:ffffffffff600000 [360540.905164] warn_bad_vsyscall: 25 callbacks suppressed [360540.905167] exe[859138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e8400a506 cs:33 sp:7fc9ed78f8e8 ax:ffffffffff600000 si:7fc9ed78fe08 di:ffffffffff600000 [360541.064122] exe[708016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e8400a506 cs:33 sp:7fc9ed78f8e8 ax:ffffffffff600000 si:7fc9ed78fe08 di:ffffffffff600000 [360541.222619] exe[648700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e8400a506 cs:33 sp:7fc9ed76e8e8 ax:ffffffffff600000 si:7fc9ed76ee08 di:ffffffffff600000 [363446.399003] exe[574176] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363446.883387] exe[574176] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363447.380121] exe[571935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363447.878165] exe[571935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363448.727975] exe[571457] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363449.362172] exe[570905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [363449.788185] exe[580249] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [364029.925565] exe[430139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a77a824506 cs:33 sp:7fad8222ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [364030.216641] exe[430139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a77a824506 cs:33 sp:7fad815fef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [364030.442590] exe[519812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a77a824506 cs:33 sp:7fad815ddf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [365180.068106] exe[986216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.234664] exe[781148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.379306] exe[985963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5596e8506 cs:33 sp:7fe6488388e8 ax:ffffffffff600000 si:7fe648838e08 di:ffffffffff600000 [365180.411987] exe[985715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e017798506 cs:33 sp:7f86cbc898e8 ax:ffffffffff600000 si:7f86cbc89e08 di:ffffffffff600000 [365180.506257] exe[906615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.638096] exe[985983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e017798506 cs:33 sp:7f86cbc898e8 ax:ffffffffff600000 si:7f86cbc89e08 di:ffffffffff600000 [365180.641528] exe[783766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5596e8506 cs:33 sp:7fe6488388e8 ax:ffffffffff600000 si:7fe648838e08 di:ffffffffff600000 [365180.732698] exe[4976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56289d244506 cs:33 sp:7f5ea54218e8 ax:ffffffffff600000 si:7f5ea5421e08 di:ffffffffff600000 [365180.745204] exe[848185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8e537506 cs:33 sp:7fc094c928e8 ax:ffffffffff600000 si:7fc094c92e08 di:ffffffffff600000 [365180.790763] exe[770106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e017798506 cs:33 sp:7f86cbc898e8 ax:ffffffffff600000 si:7f86cbc89e08 di:ffffffffff600000 [365226.888779] warn_bad_vsyscall: 3 callbacks suppressed [365226.888782] exe[974535] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365227.358644] exe[851380] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365227.785438] exe[851380] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365228.252849] exe[972142] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365228.906467] exe[852317] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365229.384293] exe[845640] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365229.917544] exe[852317] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365585.689662] exe[89242] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365586.147086] exe[82648] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365586.659429] exe[67099] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [365587.097865] exe[131554] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [366263.949972] exe[93795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366264.095313] exe[94014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366264.360581] exe[315861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366264.439502] exe[91392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ca4106506 cs:33 sp:7fe1ed0f68e8 ax:ffffffffff600000 si:7fe1ed0f6e08 di:ffffffffff600000 [366372.533981] exe[290852] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366373.133782] exe[281450] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366373.937145] exe[281007] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366374.630402] exe[287598] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [366492.726510] exe[378469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [366492.895324] exe[378516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [366493.065075] exe[378557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [366493.252502] exe[378606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621f03e4506 cs:33 sp:7ed968d088e8 ax:ffffffffff600000 si:7ed968d08e08 di:ffffffffff600000 [367486.041906] exe[352964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367486.112035] exe[350082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367486.195507] exe[348868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367486.502302] exe[348910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a08583b506 cs:33 sp:7f5e373718e8 ax:ffffffffff600000 si:7f5e37371e08 di:ffffffffff600000 [367655.617738] exe[646225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [367655.765969] exe[646254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [367655.964536] exe[646292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [367656.143497] exe[646328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563290ae9506 cs:33 sp:7ea9e1bbc8e8 ax:ffffffffff600000 si:7ea9e1bbce08 di:ffffffffff600000 [368055.014021] exe[664256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [368055.282959] exe[683121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [368055.469260] exe[664439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [368055.648001] exe[664742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643dff5c506 cs:33 sp:7fe6a60e18e8 ax:ffffffffff600000 si:7fe6a60e1e08 di:ffffffffff600000 [369134.001731] exe[931566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369134.313152] exe[816229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369134.504790] exe[932742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369134.684763] exe[929420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f5ce1b506 cs:33 sp:7f1f75c538e8 ax:ffffffffff600000 si:7f1f75c53e08 di:ffffffffff600000 [369396.665050] exe[837396] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [369432.269645] exe[945221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [369432.841508] exe[945782] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [369433.373941] exe[34704] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [369433.966806] exe[945221] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [370125.512194] exe[980701] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370125.866230] exe[182074] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370126.619151] exe[181445] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370127.301336] exe[62393] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370248.578288] exe[115486] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370276.201786] exe[138336] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [370324.712861] exe[829186] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [371825.011924] exe[559216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e1d84f506 cs:33 sp:7faa8389c8e8 ax:ffffffffff600000 si:7faa8389ce08 di:ffffffffff600000 [372021.574939] exe[256020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [372039.486835] exe[429546] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [372496.786423] exe[158259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566ebe99506 cs:33 sp:7f54bd0b88e8 ax:ffffffffff600000 si:7f54bd0b8e08 di:ffffffffff600000 [373943.837970] exe[989632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556457f07506 cs:33 sp:7f16955728e8 ax:ffffffffff600000 si:7f1695572e08 di:ffffffffff600000 [373993.165521] exe[11923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ddbaac506 cs:33 sp:7fec2aa938e8 ax:ffffffffff600000 si:7fec2aa93e08 di:ffffffffff600000 [374098.062241] exe[789008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e1bdf6506 cs:33 sp:7f349a7738e8 ax:ffffffffff600000 si:7f349a773e08 di:ffffffffff600000 [376478.249238] exe[510497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610df3a7506 cs:33 sp:7ea1573fe8e8 ax:ffffffffff600000 si:7ea1573fee08 di:ffffffffff600000 [376478.452136] exe[510558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610df3a7506 cs:33 sp:7ea1573dd8e8 ax:ffffffffff600000 si:7ea1573dde08 di:ffffffffff600000 [376478.677248] exe[510597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610df3a7506 cs:33 sp:7ea1573fe8e8 ax:ffffffffff600000 si:7ea1573fee08 di:ffffffffff600000 [380183.129347] exe[317423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e8ac01506 cs:33 sp:7f680ceff8e8 ax:ffffffffff600000 si:7f680ceffe08 di:ffffffffff600000 [380183.267688] exe[318417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e8ac01506 cs:33 sp:7f680ceff8e8 ax:ffffffffff600000 si:7f680ceffe08 di:ffffffffff600000 [380183.374007] exe[342268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e8ac01506 cs:33 sp:7f680ceff8e8 ax:ffffffffff600000 si:7f680ceffe08 di:ffffffffff600000 [382632.563874] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382632.769905] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382632.902976] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.198478] exe[296340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.289440] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.384672] exe[296539] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.559584] exe[295117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.701753] exe[296519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.826919] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382638.924979] exe[295856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382639.016463] exe[295392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382639.087915] exe[295095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382639.201380] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382774.999379] exe[296519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.214504] exe[295271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.401679] exe[296081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.439055] exe[360494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382775.568769] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.659163] exe[296126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382775.883151] exe[295392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382776.056413] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382776.238494] exe[296077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382776.276339] exe[296077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382780.014028] warn_bad_vsyscall: 75 callbacks suppressed [382780.014031] exe[296081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382780.334990] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382780.828403] exe[296102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.859456] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.897979] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.933736] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382780.967809] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382781.003534] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382781.036344] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382781.073913] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382785.723609] warn_bad_vsyscall: 45 callbacks suppressed [382785.723612] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382786.140949] exe[296079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382786.288358] exe[532485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382786.620127] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382786.975165] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382787.344975] exe[295175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382787.967385] exe[295271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382788.114865] exe[304955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382788.151717] exe[359804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382788.381729] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382791.886046] warn_bad_vsyscall: 7 callbacks suppressed [382791.886049] exe[295392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.163574] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.221854] exe[295850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.361344] exe[295888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.503166] exe[295282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.664326] exe[304953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382792.870529] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382793.294572] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382793.522817] exe[364486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382793.661138] exe[364475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382796.904366] warn_bad_vsyscall: 14 callbacks suppressed [382796.904369] exe[296081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382796.917391] exe[532575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382797.640396] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382797.919495] exe[360439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382797.971126] exe[304974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382798.603828] exe[295511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382798.824011] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382799.109316] exe[296306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382799.309270] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382799.566845] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382802.166698] warn_bad_vsyscall: 69 callbacks suppressed [382802.166701] exe[295202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382802.316132] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382803.128338] exe[295201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382803.496957] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.087062] exe[364491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.212787] exe[296341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.520817] exe[360667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.731219] exe[359689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382804.785013] exe[295175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382804.962302] exe[295225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.274554] warn_bad_vsyscall: 13 callbacks suppressed [382807.274557] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.351486] exe[364495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.540345] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382807.789489] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382808.037719] exe[295202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382808.228567] exe[295282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382808.857436] exe[295202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382809.162148] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382809.363261] exe[295117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382809.637142] exe[304974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382812.284114] warn_bad_vsyscall: 75 callbacks suppressed [382812.284118] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382813.112771] exe[307990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382813.187408] exe[295211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.010363] exe[296341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.041344] exe[304955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.139309] exe[295109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.243526] exe[295888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.286883] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.536589] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382814.812824] exe[295838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382817.380896] warn_bad_vsyscall: 8 callbacks suppressed [382817.380899] exe[305008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382817.956184] exe[305004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382818.257711] exe[295457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382818.460882] exe[295282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382819.136818] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382819.266187] exe[295229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382820.109876] exe[295278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382820.256329] exe[295445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382820.311929] exe[295445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382820.342096] exe[295184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.390640] warn_bad_vsyscall: 67 callbacks suppressed [382822.390642] exe[359928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382822.878579] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.906845] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.936717] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.965560] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382822.995701] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.026742] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.055860] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.086953] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382823.120098] exe[360192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382827.414524] warn_bad_vsyscall: 49 callbacks suppressed [382827.414527] exe[295839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382827.650241] exe[296342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.031848] exe[295183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.066992] exe[295856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.314381] exe[295172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382828.416304] exe[359705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.579511] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.629407] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.663835] exe[360486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382828.694589] exe[295225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382832.464385] warn_bad_vsyscall: 38 callbacks suppressed [382832.464388] exe[304953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382832.698568] exe[295227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382832.755706] exe[295141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.070338] exe[295227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.332885] exe[296102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.629444] exe[296340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.841051] exe[304976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382833.919742] exe[296089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382834.278035] exe[304959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382834.411299] exe[295166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382837.688759] warn_bad_vsyscall: 44 callbacks suppressed [382837.688762] exe[295223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382837.854754] exe[359707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382837.910710] exe[360554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.573668] exe[295227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.726693] exe[295169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.851732] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382838.983327] exe[296079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382839.016347] exe[295838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382839.349940] exe[295839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382839.465758] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382842.950532] warn_bad_vsyscall: 81 callbacks suppressed [382842.950535] exe[295259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382843.902982] exe[359705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382844.005862] exe[295893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6fdb8e8 ax:ffffffffff600000 si:7f90c6fdbe08 di:ffffffffff600000 [382845.028196] exe[359707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.065157] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.096426] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.123896] exe[296172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.151313] exe[295235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.176412] exe[295235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382845.205999] exe[295235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382847.956775] warn_bad_vsyscall: 59 callbacks suppressed [382847.956778] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382847.992672] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.025390] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.059739] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.094970] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.137075] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.171876] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.199918] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.228567] exe[295857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382848.266159] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.066251] warn_bad_vsyscall: 87 callbacks suppressed [382853.066254] exe[296126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.254299] exe[295223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.463249] exe[295909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.539235] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.761601] exe[304953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382853.975905] exe[295207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.158760] exe[295223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.416496] exe[295889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.574982] exe[360455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382854.789347] exe[359754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.143687] warn_bad_vsyscall: 17 callbacks suppressed [382858.143691] exe[295225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.351947] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.500911] exe[295198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.533294] exe[359711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382858.708262] exe[360593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382859.101245] exe[295871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382859.447071] exe[296085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [382859.877258] exe[295248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5c237506 cs:33 sp:7f90c6ffc8e8 ax:ffffffffff600000 si:7f90c6ffce08 di:ffffffffff600000 [385174.048843] exe[833560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560539357378 cs:33 sp:7fd93d4ecf90 ax:7fd93d4ed020 si:ffffffffff600000 di:560539421263 [385174.191645] exe[850104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560539357378 cs:33 sp:7fd93d4ecf90 ax:7fd93d4ed020 si:ffffffffff600000 di:560539421263 [385174.463878] exe[103500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560539357378 cs:33 sp:7fd93d4ecf90 ax:7fd93d4ed020 si:ffffffffff600000 di:560539421263 [385516.466348] exe[764960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d0cdc7378 cs:33 sp:7fad4c1bdf90 ax:7fad4c1be020 si:ffffffffff600000 di:560d0ce91263 [385516.849577] exe[138084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d0cdc7378 cs:33 sp:7fad4c1bdf90 ax:7fad4c1be020 si:ffffffffff600000 di:560d0ce91263 [385517.497422] exe[770698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d0cdc7378 cs:33 sp:7fad4c1bdf90 ax:7fad4c1be020 si:ffffffffff600000 di:560d0ce91263 [386065.129705] exe[57495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995e108506 cs:33 sp:7fd87bad28e8 ax:ffffffffff600000 si:7fd87bad2e08 di:ffffffffff600000 [386065.838065] exe[62778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995e108506 cs:33 sp:7fd87ba6f8e8 ax:ffffffffff600000 si:7fd87ba6fe08 di:ffffffffff600000 [386066.430379] exe[62881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55995e108506 cs:33 sp:7fd87bad28e8 ax:ffffffffff600000 si:7fd87bad2e08 di:ffffffffff600000 [390352.256099] exe[941587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460b088e8 ax:ffffffffff600000 si:7ef460b08e08 di:ffffffffff600000 [390352.855664] exe[941662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460b088e8 ax:ffffffffff600000 si:7ef460b08e08 di:ffffffffff600000 [390352.904630] exe[941674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460a848e8 ax:ffffffffff600000 si:7ef460a84e08 di:ffffffffff600000 [390353.111783] exe[941704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc84f8b506 cs:33 sp:7ef460ae78e8 ax:ffffffffff600000 si:7ef460ae7e08 di:ffffffffff600000 [390355.572575] exe[419626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402387f90 ax:7fe402388020 si:ffffffffff600000 di:555be18b4263 [390355.765841] exe[419707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402387f90 ax:7fe402388020 si:ffffffffff600000 di:555be18b4263 [390356.023670] exe[888018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402387f90 ax:7fe402388020 si:ffffffffff600000 di:555be18b4263 [390356.028300] exe[419934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be17ea378 cs:33 sp:7fe402366f90 ax:7fe402367020 si:ffffffffff600000 di:555be18b4263 [390808.923629] exe[944424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1fb9d506 cs:33 sp:7f09e619f8e8 ax:ffffffffff600000 si:7f09e619fe08 di:ffffffffff600000 [390809.095781] exe[957286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1fb9d506 cs:33 sp:7f09e617e8e8 ax:ffffffffff600000 si:7f09e617ee08 di:ffffffffff600000 [390809.880141] exe[957271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f1fb9d506 cs:33 sp:7f09e619f8e8 ax:ffffffffff600000 si:7f09e619fe08 di:ffffffffff600000 [391284.514757] exe[101301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645edda1506 cs:33 sp:7eb6f39bc8e8 ax:ffffffffff600000 si:7eb6f39bce08 di:ffffffffff600000 [391284.666526] exe[101326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645edda1506 cs:33 sp:7eb6f39bc8e8 ax:ffffffffff600000 si:7eb6f39bce08 di:ffffffffff600000 [391284.827667] exe[101351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645edda1506 cs:33 sp:7eb6f39bc8e8 ax:ffffffffff600000 si:7eb6f39bce08 di:ffffffffff600000 [391497.963043] exe[23615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123d9aa378 cs:33 sp:7f4c5b83ef90 ax:7f4c5b83f020 si:ffffffffff600000 di:56123da74263 [391498.831701] exe[122375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123d9aa378 cs:33 sp:7f4c5b3fef90 ax:7f4c5b3ff020 si:ffffffffff600000 di:56123da74263 [391499.784086] exe[56643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56123d9aa378 cs:33 sp:7f4c5b83ef90 ax:7f4c5b83f020 si:ffffffffff600000 di:56123da74263 [392230.882541] exe[224517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fdabc9506 cs:33 sp:7ee151bfe8e8 ax:ffffffffff600000 si:7ee151bfee08 di:ffffffffff600000 [392230.994703] exe[224530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fdabc9506 cs:33 sp:7ee151bdd8e8 ax:ffffffffff600000 si:7ee151bdde08 di:ffffffffff600000 [392231.114656] exe[224543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fdabc9506 cs:33 sp:7ee151bfe8e8 ax:ffffffffff600000 si:7ee151bfee08 di:ffffffffff600000 [394723.117649] exe[532684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [394724.163847] exe[574299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [394725.161639] exe[543317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [394725.161991] exe[526758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.731599] exe[667267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb2b8e8 ax:ffffffffff600000 si:7fb8ccb2be08 di:ffffffffff600000 [395919.828666] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.862607] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.890503] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.920863] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.950189] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395919.978828] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395920.008407] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395920.039745] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [395920.067391] exe[543347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a7111b506 cs:33 sp:7fb8ccb0a8e8 ax:ffffffffff600000 si:7fb8ccb0ae08 di:ffffffffff600000 [396830.646925] warn_bad_vsyscall: 25 callbacks suppressed [396830.646928] exe[876667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [396830.897326] exe[876701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [396831.127973] exe[876738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [396831.192566] exe[876738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563009c52506 cs:33 sp:7ec8d07568e8 ax:ffffffffff600000 si:7ec8d0756e08 di:ffffffffff600000 [397840.098230] exe[967648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6fdf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.631450] exe[2736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6bbf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.829495] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.895929] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.929995] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.965012] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397840.990763] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397841.018472] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397841.044829] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [397841.073327] exe[4097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f803429506 cs:33 sp:7f388c6dcf88 ax:ffffffffff600000 si:20000640 di:ffffffffff600000 [398295.666499] warn_bad_vsyscall: 25 callbacks suppressed [398295.666503] exe[98105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398295.859933] exe[98129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398295.912295] exe[98129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398296.193605] exe[98181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398296.232868] exe[98181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ab92506 cs:33 sp:7ee047dd58e8 ax:ffffffffff600000 si:7ee047dd5e08 di:ffffffffff600000 [398310.091286] exe[100097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.245436] exe[100123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.351478] exe[100138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.588456] exe[100172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398310.766814] exe[100200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398311.031049] exe[100235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [398311.146697] exe[100258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559185857506 cs:33 sp:7ec2d85fe8e8 ax:ffffffffff600000 si:7ec2d85fee08 di:ffffffffff600000 [399891.746018] exe[243871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55783feee506 cs:33 sp:7fb39ff658e8 ax:ffffffffff600000 si:7fb39ff65e08 di:ffffffffff600000 [399892.031026] exe[290305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55783feee506 cs:33 sp:7fb39ff658e8 ax:ffffffffff600000 si:7fb39ff65e08 di:ffffffffff600000 [399892.554324] exe[243912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55783feee506 cs:33 sp:7fb39ff658e8 ax:ffffffffff600000 si:7fb39ff65e08 di:ffffffffff600000 [400349.334426] exe[392084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef02061f8e8 ax:ffffffffff600000 si:7ef02061fe08 di:ffffffffff600000 [400349.518144] exe[392106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef0201fe8e8 ax:ffffffffff600000 si:7ef0201fee08 di:ffffffffff600000 [400350.185378] exe[392190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef02061f8e8 ax:ffffffffff600000 si:7ef02061fe08 di:ffffffffff600000 [400350.243070] exe[392196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b06ecb8506 cs:33 sp:7ef0201fe8e8 ax:ffffffffff600000 si:7ef0201fee08 di:ffffffffff600000 [401982.811790] exe[692349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823f58e8 ax:ffffffffff600000 si:7eb4823f5e08 di:ffffffffff600000 [401983.004533] exe[692387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823f58e8 ax:ffffffffff600000 si:7eb4823f5e08 di:ffffffffff600000 [401983.004538] exe[692392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823d48e8 ax:ffffffffff600000 si:7eb4823d4e08 di:ffffffffff600000 [401983.508893] exe[692475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56241a00c506 cs:33 sp:7eb4823f58e8 ax:ffffffffff600000 si:7eb4823f5e08 di:ffffffffff600000 [402017.472906] exe[698311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402017.617877] exe[698337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402017.773050] exe[698357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402017.836299] exe[698357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0ceb84506 cs:33 sp:7ed7831388e8 ax:ffffffffff600000 si:7ed783138e08 di:ffffffffff600000 [402996.356014] exe[634598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e376858378 cs:33 sp:7f8fb9f32f90 ax:7f8fb9f33020 si:ffffffffff600000 di:55e376922263 [402996.454524] exe[680017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e376858378 cs:33 sp:7f8fb9f11f90 ax:7f8fb9f12020 si:ffffffffff600000 di:55e376922263 [402996.534513] exe[634597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e376858378 cs:33 sp:7f8fb9f11f90 ax:7f8fb9f12020 si:ffffffffff600000 di:55e376922263 [403384.938961] exe[777895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a6d73ff378 cs:33 sp:7f494881ff90 ax:7f4948820020 si:ffffffffff600000 di:55a6d74c9263 [403388.237401] exe[688633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eb3d79378 cs:33 sp:7efc4e5c3f90 ax:7efc4e5c4020 si:ffffffffff600000 di:558eb3e43263 [403470.383750] exe[790463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d2690a378 cs:33 sp:7ff22e0b9f90 ax:7ff22e0ba020 si:ffffffffff600000 di:557d269d4263 [403502.560866] exe[901412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bfa531378 cs:33 sp:7fa1c40fff90 ax:7fa1c4100020 si:ffffffffff600000 di:556bfa5fb263 [403552.445639] exe[938340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e90b223378 cs:33 sp:7ed73b6cef90 ax:7ed73b6cf020 si:ffffffffff600000 di:55e90b2ed263 [403593.868542] exe[751581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eedc18c378 cs:33 sp:7ffad72a6f90 ax:7ffad72a7020 si:ffffffffff600000 di:55eedc256263 [403614.415897] exe[647202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fde1c58378 cs:33 sp:7efe4b513f90 ax:7efe4b514020 si:ffffffffff600000 di:55fde1d22263 [403621.822840] exe[948796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e9a7e1d378 cs:33 sp:7ef7a048ef90 ax:7ef7a048f020 si:ffffffffff600000 di:55e9a7ee7263 [403631.531519] exe[890212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a07e059378 cs:33 sp:7ff3fedf2f90 ax:7ff3fedf3020 si:ffffffffff600000 di:55a07e123263 [403712.590005] exe[724209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0f06e9378 cs:33 sp:7fa161f58f90 ax:7fa161f59020 si:ffffffffff600000 di:55b0f07b3263 [403750.768970] exe[669292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe3ebaa378 cs:33 sp:7fd6afbb2f90 ax:7fd6afbb3020 si:ffffffffff600000 di:55fe3ec74263 [403848.381122] exe[914605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564178b16378 cs:33 sp:7f0cf4f6bf90 ax:7f0cf4f6c020 si:ffffffffff600000 di:564178be0263 [403874.592148] exe[851983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649d7c10378 cs:33 sp:7fa9daf24f90 ax:7fa9daf25020 si:ffffffffff600000 di:5649d7cda263 [403908.840967] exe[993236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df4018e378 cs:33 sp:7ec4b0f4df90 ax:7ec4b0f4e020 si:ffffffffff600000 di:55df40258263 [405340.182898] exe[203090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592179b8378 cs:33 sp:7f5aebfb3f90 ax:7f5aebfb4020 si:ffffffffff600000 di:559217a82263 [405977.789785] exe[191317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109298e8 ax:ffffffffff600000 si:7f4710929e08 di:ffffffffff600000 [405977.908555] exe[191046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109298e8 ax:ffffffffff600000 si:7f4710929e08 di:ffffffffff600000 [405977.954469] exe[192853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109088e8 ax:ffffffffff600000 si:7f4710908e08 di:ffffffffff600000 [405978.097805] exe[261688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c26f0d5506 cs:33 sp:7f47109298e8 ax:ffffffffff600000 si:7f4710929e08 di:ffffffffff600000 [408561.228963] exe[277598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebfb38e8 ax:ffffffffff600000 si:7f5aebfb3e08 di:ffffffffff600000 [408561.646060] exe[702629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.502623] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.544174] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.574013] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.601066] exe[702766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.625833] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.650109] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.701805] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408562.737080] exe[702448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559217a07506 cs:33 sp:7f5aebf928e8 ax:ffffffffff600000 si:7f5aebf92e08 di:ffffffffff600000 [408570.463931] warn_bad_vsyscall: 25 callbacks suppressed [408570.463934] exe[651457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb6fa6378 cs:33 sp:7f79f3732f90 ax:7f79f3733020 si:ffffffffff600000 di:556fb7070263 [408570.761990] exe[612681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb6fa6378 cs:33 sp:7f79f3732f90 ax:7f79f3733020 si:ffffffffff600000 di:556fb7070263 [408571.204120] exe[656243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb6fa6378 cs:33 sp:7f79f3732f90 ax:7f79f3733020 si:ffffffffff600000 di:556fb7070263 [408907.394547] exe[784939] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408907.959021] exe[783568] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408908.614797] exe[780068] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408909.057974] exe[779056] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [408939.052126] exe[763141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585672aa506 cs:33 sp:7fb95cbc28e8 ax:ffffffffff600000 si:7fb95cbc2e08 di:ffffffffff600000 [408939.193472] exe[762486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585672aa506 cs:33 sp:7fb95cba18e8 ax:ffffffffff600000 si:7fb95cba1e08 di:ffffffffff600000 [408939.907174] exe[763471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5585672aa506 cs:33 sp:7fb95cbc28e8 ax:ffffffffff600000 si:7fb95cbc2e08 di:ffffffffff600000 [409772.941587] exe[204372] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [409773.593580] exe[182073] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [409773.735726] exe[200088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [409774.230552] exe[207155] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [413436.098468] exe[447984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bce3f90 ax:7f961bce4020 si:ffffffffff600000 di:5574058a0263 [413436.416456] exe[447984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bce3f90 ax:7f961bce4020 si:ffffffffff600000 di:5574058a0263 [413436.417629] exe[263849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bcc2f90 ax:7f961bcc3020 si:ffffffffff600000 di:5574058a0263 [413436.617867] exe[184089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5574057d6378 cs:33 sp:7f961bce3f90 ax:7f961bce4020 si:ffffffffff600000 di:5574058a0263 [415237.381090] exe[484279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90ba8e8 ax:ffffffffff600000 si:7fd1b90bae08 di:ffffffffff600000 [415237.701018] exe[475929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90ba8e8 ax:ffffffffff600000 si:7fd1b90bae08 di:ffffffffff600000 [415238.079935] exe[473138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90ba8e8 ax:ffffffffff600000 si:7fd1b90bae08 di:ffffffffff600000 [415238.084608] exe[471872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56138f37b506 cs:33 sp:7fd1b90998e8 ax:ffffffffff600000 si:7fd1b9099e08 di:ffffffffff600000 [415631.756483] exe[923750] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [415686.028201] exe[648853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565bb646506 cs:33 sp:7f58b03df8e8 ax:ffffffffff600000 si:7f58b03dfe08 di:ffffffffff600000 [415686.255766] exe[571438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565bb646506 cs:33 sp:7f58b03df8e8 ax:ffffffffff600000 si:7f58b03dfe08 di:ffffffffff600000 [415686.513780] exe[575328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565bb646506 cs:33 sp:7f58b03df8e8 ax:ffffffffff600000 si:7f58b03dfe08 di:ffffffffff600000 [416542.609512] exe[574666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55799b2b1506 cs:33 sp:7fb350541f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [416542.810695] exe[589172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55799b2b1506 cs:33 sp:7fb350541f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [416542.990497] exe[577054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55799b2b1506 cs:33 sp:7fb350541f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [417498.582507] exe[211339] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417499.112488] exe[667020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417499.233816] exe[667020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417499.947994] exe[665999] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417500.099466] exe[916102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [417693.286130] exe[101732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9b41f1506 cs:33 sp:7f39220c9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [417693.720788] exe[120651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9b41f1506 cs:33 sp:7f39220c9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [417693.910084] exe[182078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9b41f1506 cs:33 sp:7f39220c9f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [418104.049323] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418104.262254] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418104.308335] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418104.502237] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418104.505705] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418178.085838] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418178.379107] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418178.644708] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.142073] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.400441] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.649627] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418179.767680] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418180.620658] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418180.725578] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418180.892044] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.181869] warn_bad_vsyscall: 11 callbacks suppressed [418183.181873] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.386669] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.542047] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418183.777375] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.069659] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.427309] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.637948] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418184.649037] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418185.058604] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418185.493594] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.289555] warn_bad_vsyscall: 13 callbacks suppressed [418188.289558] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.414757] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.612303] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418188.831459] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.053154] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.372760] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.574873] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418189.789555] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418189.988290] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418190.140010] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418193.352973] warn_bad_vsyscall: 17 callbacks suppressed [418193.352976] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418193.576998] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418193.661572] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418193.879593] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418194.139464] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.172453] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.409107] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.488392] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.515945] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418194.616036] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.426962] warn_bad_vsyscall: 25 callbacks suppressed [418198.426965] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.486488] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418198.684714] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.892984] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418198.926606] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.226443] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.261409] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.409363] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.643420] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418199.835008] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.445726] warn_bad_vsyscall: 70 callbacks suppressed [418203.445730] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.522237] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.634399] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.829774] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418203.947319] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.068126] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.194698] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.353540] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.443576] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418204.629416] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418208.752051] warn_bad_vsyscall: 32 callbacks suppressed [418208.752054] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418208.784448] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.075478] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.219447] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418209.480702] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418209.677781] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.951870] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418209.981701] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418210.137134] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418210.279967] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418213.837996] warn_bad_vsyscall: 32 callbacks suppressed [418213.838000] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.115833] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.396579] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.456987] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.584507] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.738787] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.939194] exe[280850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418214.962309] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418215.249106] exe[270218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418215.426363] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418218.949592] warn_bad_vsyscall: 32 callbacks suppressed [418218.949595] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418219.174806] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418219.312712] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418219.578383] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418219.807404] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.044752] exe[134984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.226554] exe[132566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.358357] exe[139460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.583333] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418220.628582] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418223.971943] warn_bad_vsyscall: 47 callbacks suppressed [418223.971947] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418224.043326] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.280510] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.304110] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.331606] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.360028] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.382614] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.408975] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.442655] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418224.470334] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4751f90 ax:7fd1e4752020 si:ffffffffff600000 di:55efd18b9263 [418228.986212] warn_bad_vsyscall: 61 callbacks suppressed [418228.986215] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4730f90 ax:7fd1e4731020 si:ffffffffff600000 di:55efd18b9263 [418229.282239] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.494105] exe[132570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.518544] exe[132600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.640075] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.661158] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418229.811323] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418230.028753] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418230.178857] exe[149915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418230.309993] exe[132595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.126512] warn_bad_vsyscall: 34 callbacks suppressed [418234.126515] exe[132595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.289753] exe[281130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.373648] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.446149] exe[132568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.541651] exe[132568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.801381] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418234.989817] exe[132561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418235.160192] exe[132568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418236.824023] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418237.009542] exe[139141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418333.934606] warn_bad_vsyscall: 3 callbacks suppressed [418333.934610] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418334.105326] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418334.395154] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418334.732084] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.054176] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.358175] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.548791] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418335.773744] exe[149922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418336.056789] exe[134085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418336.160002] exe[152989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efd17ef378 cs:33 sp:7fd1e4772f90 ax:7fd1e4773020 si:ffffffffff600000 di:55efd18b9263 [418548.755843] warn_bad_vsyscall: 3 callbacks suppressed [418548.755847] exe[376318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd5cab378 cs:33 sp:7f1271ec0f90 ax:7f1271ec1020 si:ffffffffff600000 di:555fd5d75263 [418557.217551] exe[378765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82cac0378 cs:33 sp:7ece13a42f90 ax:7ece13a43020 si:ffffffffff600000 di:55f82cb8a263 [418839.087390] exe[53054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b93060378 cs:33 sp:7feb1c03df90 ax:7feb1c03e020 si:ffffffffff600000 di:561b9312a263 [418853.093466] exe[36834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ead929378 cs:33 sp:7f5e669b7f90 ax:7f5e669b8020 si:ffffffffff600000 di:555ead9f3263 [418969.017697] exe[403439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55722f473378 cs:33 sp:7fbaee0bcf90 ax:7fbaee0bd020 si:ffffffffff600000 di:55722f53d263 [418983.999635] exe[444910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55648631f378 cs:33 sp:7ea7747fef90 ax:7ea7747ff020 si:ffffffffff600000 di:5564863e9263 [419011.006164] exe[109976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561003033378 cs:33 sp:7fd506c6df90 ax:7fd506c6e020 si:ffffffffff600000 di:5610030fd263 [419019.775936] exe[422256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dae604378 cs:33 sp:7efd22591f90 ax:7efd22592020 si:ffffffffff600000 di:562dae6ce263 [419077.312445] exe[112861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56423e1ab378 cs:33 sp:7fb195175f90 ax:7fb195176020 si:ffffffffff600000 di:56423e275263 [419258.683264] exe[462034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643836a2378 cs:33 sp:7feff975df90 ax:7feff975e020 si:ffffffffff600000 di:56438376c263 [419320.879379] exe[680834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561593356378 cs:33 sp:7fc34da5af90 ax:7fc34da5b020 si:ffffffffff600000 di:561593420263 [419338.633785] exe[499314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbeaaa3378 cs:33 sp:7eb6821f0f90 ax:7eb6821f1020 si:ffffffffff600000 di:55bbeab6d263 [419491.961314] exe[483313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653d0e96378 cs:33 sp:7fa2479daf90 ax:7fa2479db020 si:ffffffffff600000 di:5653d0f60263 [421449.526018] exe[638197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [421450.533339] exe[934477] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [421451.080722] exe[851645] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [421451.221261] exe[680604] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [422178.612876] exe[875108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [422178.928396] exe[866500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [422178.987639] exe[866504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [422179.167042] exe[866500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a726b87378 cs:33 sp:7f8ddc13ff90 ax:7f8ddc140020 si:ffffffffff600000 di:55a726c51263 [424600.851779] exe[252498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cf610a378 cs:33 sp:7faa79134f90 ax:7faa79135020 si:ffffffffff600000 di:555cf61d4263 [424600.986166] exe[250622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cf610a378 cs:33 sp:7faa79113f90 ax:7faa79114020 si:ffffffffff600000 di:555cf61d4263 [424601.135949] exe[250622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cf610a378 cs:33 sp:7faa79113f90 ax:7faa79114020 si:ffffffffff600000 di:555cf61d4263 [426557.880508] exe[581731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [426557.977327] exe[581737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [426558.025392] exe[581737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [426558.157128] exe[581754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d0051a506 cs:33 sp:7ece2b3cf8e8 ax:ffffffffff600000 si:7ece2b3cfe08 di:ffffffffff600000 [428694.567856] exe[795404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.703818] exe[804015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.733316] exe[804015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.817106] exe[814764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [428694.845303] exe[804015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad270f90 ax:7fd7ad271020 si:ffffffffff600000 di:5573dd732263 [428776.327080] exe[897245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632757b1378 cs:33 sp:7fc82814df90 ax:7fc82814e020 si:ffffffffff600000 di:56327587b263 [428776.693777] exe[895974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632757b1378 cs:33 sp:7fc82814df90 ax:7fc82814e020 si:ffffffffff600000 di:56327587b263 [428776.959978] exe[896011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632757b1378 cs:33 sp:7fc82814df90 ax:7fc82814e020 si:ffffffffff600000 di:56327587b263 [429440.191674] exe[924015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429440.411358] exe[956295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429440.471116] exe[924015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429440.677712] exe[924015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573dd668378 cs:33 sp:7fd7ad291f90 ax:7fd7ad292020 si:ffffffffff600000 di:5573dd732263 [429487.590469] exe[745129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608630506 cs:33 sp:7fb0801d28e8 ax:ffffffffff600000 si:7fb0801d2e08 di:ffffffffff600000 [429487.842985] exe[745894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608630506 cs:33 sp:7fb0801d28e8 ax:ffffffffff600000 si:7fb0801d2e08 di:ffffffffff600000 [429488.274964] exe[687729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f608630506 cs:33 sp:7fb0801d28e8 ax:ffffffffff600000 si:7fb0801d2e08 di:ffffffffff600000 [431520.317787] exe[294739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def2b8e8 ax:ffffffffff600000 si:7ec6def2be08 di:ffffffffff600000 [431520.505386] exe[294777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def2b8e8 ax:ffffffffff600000 si:7ec6def2be08 di:ffffffffff600000 [431520.532544] exe[294779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def0a8e8 ax:ffffffffff600000 si:7ec6def0ae08 di:ffffffffff600000 [431520.690793] exe[294799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555937f68506 cs:33 sp:7ec6def2b8e8 ax:ffffffffff600000 si:7ec6def2be08 di:ffffffffff600000 [432213.116052] exe[400600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb6a378e8 ax:ffffffffff600000 si:7eddb6a37e08 di:ffffffffff600000 [432213.330291] exe[400635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb6a378e8 ax:ffffffffff600000 si:7eddb6a37e08 di:ffffffffff600000 [432213.487960] exe[400664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb6a378e8 ax:ffffffffff600000 si:7eddb6a37e08 di:ffffffffff600000 [432213.524177] exe[400666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562815a11506 cs:33 sp:7eddb65fe8e8 ax:ffffffffff600000 si:7eddb65fee08 di:ffffffffff600000 [433475.349338] exe[501690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71366f90 ax:7f5d71367020 si:ffffffffff600000 di:55d1ecbef263 [433475.736337] exe[565214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71366f90 ax:7f5d71367020 si:ffffffffff600000 di:55d1ecbef263 [433476.251462] exe[555799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71366f90 ax:7f5d71367020 si:ffffffffff600000 di:55d1ecbef263 [433906.182693] exe[663239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6614f506 cs:33 sp:7eefc716e8e8 ax:ffffffffff600000 si:7eefc716ee08 di:ffffffffff600000 [433906.368674] exe[663261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6614f506 cs:33 sp:7eefc716e8e8 ax:ffffffffff600000 si:7eefc716ee08 di:ffffffffff600000 [433906.565778] exe[663291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6614f506 cs:33 sp:7eefc716e8e8 ax:ffffffffff600000 si:7eefc716ee08 di:ffffffffff600000 [434569.538788] exe[601416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71387f90 ax:7f5d71388020 si:ffffffffff600000 di:55d1ecbef263 [434569.843255] exe[647359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71387f90 ax:7f5d71388020 si:ffffffffff600000 di:55d1ecbef263 [434570.268909] exe[601398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1ecb25378 cs:33 sp:7f5d71387f90 ax:7f5d71388020 si:ffffffffff600000 di:55d1ecbef263 [435094.733960] exe[544607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563182f64506 cs:33 sp:7fba57dce8e8 ax:ffffffffff600000 si:7fba57dcee08 di:ffffffffff600000 [435095.032811] exe[447209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563182f64506 cs:33 sp:7fba57dce8e8 ax:ffffffffff600000 si:7fba57dcee08 di:ffffffffff600000 [435095.650903] exe[768277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563182f64506 cs:33 sp:7fba57dce8e8 ax:ffffffffff600000 si:7fba57dcee08 di:ffffffffff600000 [435302.925459] exe[884068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614e5f40378 cs:33 sp:7f6cec07df90 ax:7f6cec07e020 si:ffffffffff600000 di:5614e600a263 [435302.987559] exe[881436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614e5f40378 cs:33 sp:7f6cec05cf90 ax:7f6cec05d020 si:ffffffffff600000 di:5614e600a263 [435303.056939] exe[884087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614e5f40378 cs:33 sp:7f6cec07df90 ax:7f6cec07e020 si:ffffffffff600000 di:5614e600a263 [436132.227595] exe[8027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ab4e00378 cs:33 sp:7f33b449ff90 ax:7f33b44a0020 si:ffffffffff600000 di:558ab4eca263 [436138.448812] exe[626538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ab7812378 cs:33 sp:7f02ceda1f90 ax:7f02ceda2020 si:ffffffffff600000 di:559ab78dc263 [436210.698512] exe[26270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a992ea0378 cs:33 sp:7f9bef101f90 ax:7f9bef102020 si:ffffffffff600000 di:55a992f6a263 [436267.377827] exe[858834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054ded506 cs:33 sp:7f0f4cbf28e8 ax:ffffffffff600000 si:7f0f4cbf2e08 di:ffffffffff600000 [436267.478446] exe[854807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054ded506 cs:33 sp:7f0f4cbf28e8 ax:ffffffffff600000 si:7f0f4cbf2e08 di:ffffffffff600000 [436267.611095] exe[854807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054ded506 cs:33 sp:7f0f4cbf28e8 ax:ffffffffff600000 si:7f0f4cbf2e08 di:ffffffffff600000 [436294.189828] exe[912966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f488e8 ax:ffffffffff600000 si:7fe274f48e08 di:ffffffffff600000 [436294.265955] exe[971983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f488e8 ax:ffffffffff600000 si:7fe274f48e08 di:ffffffffff600000 [436294.351428] exe[912972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f488e8 ax:ffffffffff600000 si:7fe274f48e08 di:ffffffffff600000 [436294.352864] exe[912966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362c246506 cs:33 sp:7fe274f278e8 ax:ffffffffff600000 si:7fe274f27e08 di:ffffffffff600000 [436414.128409] exe[68433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558dec846378 cs:33 sp:7ea7073f5f90 ax:7ea7073f6020 si:ffffffffff600000 di:558dec910263 [436478.732520] exe[993480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [436479.009704] exe[866559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [436479.461267] exe[866559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [436493.256041] exe[77155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596749b9378 cs:33 sp:7f4e68f21f90 ax:7f4e68f22020 si:ffffffffff600000 di:559674a83263 [436561.880520] exe[876351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8f1ce1378 cs:33 sp:7f8bb13fef90 ax:7f8bb13ff020 si:ffffffffff600000 di:55a8f1dab263 [436567.470019] exe[974437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac156cf378 cs:33 sp:7f6aff8faf90 ax:7f6aff8fb020 si:ffffffffff600000 di:55ac15799263 [436599.819558] exe[866059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559054d9e378 cs:33 sp:7f0f4cbf2f90 ax:7f0f4cbf3020 si:ffffffffff600000 di:559054e68263 [436635.476020] exe[97663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef2173378 cs:33 sp:7ef592333f90 ax:7ef592334020 si:ffffffffff600000 di:561ef223d263 [436799.113308] exe[105013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56368dda2506 cs:33 sp:7fd7370998e8 ax:ffffffffff600000 si:7fd737099e08 di:ffffffffff600000 [436799.517247] exe[874550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56368dda2506 cs:33 sp:7fd7370998e8 ax:ffffffffff600000 si:7fd737099e08 di:ffffffffff600000 [436799.965569] exe[941373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56368dda2506 cs:33 sp:7fd7370998e8 ax:ffffffffff600000 si:7fd737099e08 di:ffffffffff600000 [436892.125353] exe[131143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f1fecc378 cs:33 sp:7ebd1ab8df90 ax:7ebd1ab8e020 si:ffffffffff600000 di:558f1ff96263 [437086.663234] exe[83158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9d89f9378 cs:33 sp:7f487b430f90 ax:7f487b431020 si:ffffffffff600000 di:55f9d8ac3263 [437466.788597] exe[894928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892c38e8 ax:ffffffffff600000 si:7f07892c3e08 di:ffffffffff600000 [437466.932550] exe[955953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892c38e8 ax:ffffffffff600000 si:7f07892c3e08 di:ffffffffff600000 [437466.932670] exe[184596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892a28e8 ax:ffffffffff600000 si:7f07892a2e08 di:ffffffffff600000 [437467.224997] exe[853471] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569964ed506 cs:33 sp:7f07892818e8 ax:ffffffffff600000 si:7f0789281e08 di:ffffffffff600000 [438055.978112] exe[310404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f00659506 cs:33 sp:7efb2eed68e8 ax:ffffffffff600000 si:7efb2eed6e08 di:ffffffffff600000 [438056.180687] exe[310440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f00659506 cs:33 sp:7efb2eed68e8 ax:ffffffffff600000 si:7efb2eed6e08 di:ffffffffff600000 [438056.433217] exe[310496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f00659506 cs:33 sp:7efb2eeb58e8 ax:ffffffffff600000 si:7efb2eeb5e08 di:ffffffffff600000 [438550.272474] exe[83404] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [438550.629007] exe[999564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [438550.724359] exe[976519] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [438570.052377] exe[312428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557e3197378 cs:33 sp:7f6c30762f90 ax:7f6c30763020 si:ffffffffff600000 di:5557e3261263 [438971.456264] exe[394752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608a5dee378 cs:33 sp:7f05440dbf90 ax:7f05440dc020 si:ffffffffff600000 di:5608a5eb8263 [439825.721926] exe[542324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [439825.804878] exe[604297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [439825.967207] exe[495951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [439826.004132] exe[542324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560579640378 cs:33 sp:7fc4cc5ecf90 ax:7fc4cc5ed020 si:ffffffffff600000 di:56057970a263 [440054.823048] exe[518705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaedab3378 cs:33 sp:7f704d031f90 ax:7f704d032020 si:ffffffffff600000 di:55eaedb7d263 [440055.038034] exe[621715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaedab3378 cs:33 sp:7f704d031f90 ax:7f704d032020 si:ffffffffff600000 di:55eaedb7d263 [440055.255915] exe[644180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eaedab3378 cs:33 sp:7f704d031f90 ax:7f704d032020 si:ffffffffff600000 di:55eaedb7d263 [440228.665030] exe[240538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb545f378 cs:33 sp:7f7d1c19ef90 ax:7f7d1c19f020 si:ffffffffff600000 di:561bb5529263 [440228.867753] exe[240538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb545f378 cs:33 sp:7f7d1c15cf90 ax:7f7d1c15d020 si:ffffffffff600000 di:561bb5529263 [440229.172551] exe[240538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb545f378 cs:33 sp:7f7d1c15cf90 ax:7f7d1c15d020 si:ffffffffff600000 di:561bb5529263 [441238.970327] exe[768778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da848e8 ax:ffffffffff600000 si:7f741da84e08 di:ffffffffff600000 [441239.819142] exe[584875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da218e8 ax:ffffffffff600000 si:7f741da21e08 di:ffffffffff600000 [441240.481316] exe[820501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da638e8 ax:ffffffffff600000 si:7f741da63e08 di:ffffffffff600000 [441240.481616] exe[571737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9c88a3506 cs:33 sp:7f741da848e8 ax:ffffffffff600000 si:7f741da84e08 di:ffffffffff600000 [441248.663550] exe[784547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441248.821069] exe[770417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441248.951087] exe[827735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441249.009520] exe[765438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1901f9506 cs:33 sp:7fe08b9b28e8 ax:ffffffffff600000 si:7fe08b9b2e08 di:ffffffffff600000 [441889.918703] exe[849331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d98a7ee378 cs:33 sp:7fda9c9faf90 ax:7fda9c9fb020 si:ffffffffff600000 di:55d98a8b8263 [441890.957892] exe[719393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d98a7ee378 cs:33 sp:7fda9c9faf90 ax:7fda9c9fb020 si:ffffffffff600000 di:55d98a8b8263 [441891.252618] exe[661904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d98a7ee378 cs:33 sp:7fda9c9faf90 ax:7fda9c9fb020 si:ffffffffff600000 di:55d98a8b8263 [444034.025546] exe[950682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b30af90 ax:7f906b30b020 si:ffffffffff600000 di:559a40246263 [444034.291982] exe[224578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b30af90 ax:7f906b30b020 si:ffffffffff600000 di:559a40246263 [444034.292411] exe[224079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b2e9f90 ax:7f906b2ea020 si:ffffffffff600000 di:559a40246263 [444034.574824] exe[224087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a4017c378 cs:33 sp:7f906b30af90 ax:7f906b30b020 si:ffffffffff600000 di:559a40246263 [444377.084968] exe[235076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14a7ef506 cs:33 sp:7fd8d7e478e8 ax:ffffffffff600000 si:7fd8d7e47e08 di:ffffffffff600000 [444378.122989] exe[231037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14a7ef506 cs:33 sp:7fd8d7e478e8 ax:ffffffffff600000 si:7fd8d7e47e08 di:ffffffffff600000 [444378.891223] exe[222392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b14a7ef506 cs:33 sp:7fd8d79fe8e8 ax:ffffffffff600000 si:7fd8d79fee08 di:ffffffffff600000 [444450.301356] exe[236575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d00d2506 cs:33 sp:7f32a4bae8e8 ax:ffffffffff600000 si:7f32a4baee08 di:ffffffffff600000 [444450.841718] exe[224261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d00d2506 cs:33 sp:7f32a4bae8e8 ax:ffffffffff600000 si:7f32a4baee08 di:ffffffffff600000 [444451.444213] exe[241086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9d00d2506 cs:33 sp:7f32a4b8d8e8 ax:ffffffffff600000 si:7f32a4b8de08 di:ffffffffff600000 [444484.306928] exe[279159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1bde0a506 cs:33 sp:7f0f6aa4a8e8 ax:ffffffffff600000 si:7f0f6aa4ae08 di:ffffffffff600000 [444484.904850] exe[985478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1bde0a506 cs:33 sp:7f0f6aa4a8e8 ax:ffffffffff600000 si:7f0f6aa4ae08 di:ffffffffff600000 [444485.351559] exe[979131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1bde0a506 cs:33 sp:7f0f6aa4a8e8 ax:ffffffffff600000 si:7f0f6aa4ae08 di:ffffffffff600000 [445292.090973] exe[396012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5add158e8 ax:ffffffffff600000 si:7ee5add15e08 di:ffffffffff600000 [445292.315313] exe[396065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5add158e8 ax:ffffffffff600000 si:7ee5add15e08 di:ffffffffff600000 [445292.549323] exe[396103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5add158e8 ax:ffffffffff600000 si:7ee5add15e08 di:ffffffffff600000 [445292.574893] exe[396105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f2f2e5506 cs:33 sp:7ee5adcf48e8 ax:ffffffffff600000 si:7ee5adcf4e08 di:ffffffffff600000 [447997.574021] exe[765367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447997.950554] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447997.979711] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.007729] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.042742] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.076642] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.110930] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.146734] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.180450] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [447998.214866] exe[646825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55651c5bf378 cs:33 sp:7f7405229f90 ax:7f740522a020 si:ffffffffff600000 di:55651c689263 [451968.259481] warn_bad_vsyscall: 25 callbacks suppressed [451968.259485] exe[468193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c7a3d6506 cs:33 sp:7ea6d8c268e8 ax:ffffffffff600000 si:7ea6d8c26e08 di:ffffffffff600000 [451968.425952] exe[468218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c7a3d6506 cs:33 sp:7ea6d8c268e8 ax:ffffffffff600000 si:7ea6d8c26e08 di:ffffffffff600000 [451969.126662] exe[468285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c7a3d6506 cs:33 sp:7ea6d8c268e8 ax:ffffffffff600000 si:7ea6d8c26e08 di:ffffffffff600000 [452295.347575] exe[20405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3768af506 cs:33 sp:7fb27d8e28e8 ax:ffffffffff600000 si:7fb27d8e2e08 di:ffffffffff600000 [452296.112938] exe[42124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3768af506 cs:33 sp:7fb27d8e28e8 ax:ffffffffff600000 si:7fb27d8e2e08 di:ffffffffff600000 [452296.259276] exe[76592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3768af506 cs:33 sp:7fb27d8e28e8 ax:ffffffffff600000 si:7fb27d8e2e08 di:ffffffffff600000 [452319.171150] exe[20530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.276113] exe[21484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.390853] exe[20403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.525404] exe[21478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.652276] exe[64119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.743475] exe[20487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.833096] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452319.945010] exe[50875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452320.006835] exe[21478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452320.164099] exe[435045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452324.436756] warn_bad_vsyscall: 83 callbacks suppressed [452324.436760] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452324.729345] exe[64119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452324.944993] exe[50858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.120093] exe[20378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452325.286261] exe[20147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.442899] exe[64074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.450554] exe[20501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452325.607647] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.737695] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452325.890561] exe[21287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.446174] warn_bad_vsyscall: 120 callbacks suppressed [452329.446177] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.480077] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.510413] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.549968] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.578785] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.606895] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.639888] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.672917] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452329.851231] exe[20460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452330.128883] exe[76592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452334.549640] warn_bad_vsyscall: 65 callbacks suppressed [452334.549645] exe[20403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452334.718010] exe[20119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.751443] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.780948] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.812581] exe[20148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.840892] exe[20041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.867634] exe[20041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.895646] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.925044] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452334.955585] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452339.589963] warn_bad_vsyscall: 139 callbacks suppressed [452339.589966] exe[20134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452339.640564] exe[20251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452339.775276] exe[20185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.059991] exe[42080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.290830] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452340.486345] exe[20193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.643427] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.680251] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452340.978400] exe[20147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452341.444372] exe[20267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452344.660232] warn_bad_vsyscall: 10 callbacks suppressed [452344.660235] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452344.903705] exe[20386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.693056] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.724799] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.764463] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.794541] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.824795] exe[20157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.855818] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.889579] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452345.924579] exe[76510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452349.746468] warn_bad_vsyscall: 43 callbacks suppressed [452349.746471] exe[328066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.113817] exe[69794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.363064] exe[76542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.536165] exe[54267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.671631] exe[51059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.812918] exe[22427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452350.832387] exe[76548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452350.952814] exe[20287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452351.072785] exe[20287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452351.209398] exe[51043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.250504] warn_bad_vsyscall: 119 callbacks suppressed [452355.250507] exe[20151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.423492] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.515766] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.657921] exe[20535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.755664] exe[20573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.870486] exe[20588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452355.962609] exe[20592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.159715] exe[434957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.212450] exe[22422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452356.355659] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452360.376744] warn_bad_vsyscall: 116 callbacks suppressed [452360.376747] exe[76548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452360.709828] exe[20302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.071503] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.547987] exe[20535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.726910] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.771671] exe[20361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452361.918275] exe[20224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.148831] exe[20588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.337844] exe[20134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452362.530033] exe[54179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.512425] warn_bad_vsyscall: 16 callbacks suppressed [452365.512428] exe[434993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.720991] exe[434957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452365.882172] exe[54182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.024659] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.057332] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.090324] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.127998] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.161781] exe[20508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.191615] exe[20526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452366.224902] exe[20526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.526773] warn_bad_vsyscall: 112 callbacks suppressed [452370.526777] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.562416] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.591092] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.620943] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.653877] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.686990] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.718028] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.749500] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.780430] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452370.810140] exe[328025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452375.643596] warn_bad_vsyscall: 104 callbacks suppressed [452375.643601] exe[20426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452375.968939] exe[20368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452376.163289] exe[20272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.299944] exe[20571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.390126] exe[20384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.488374] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.569364] exe[64116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.685764] exe[20354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b29fe8e8 ax:ffffffffff600000 si:7f87b29fee08 di:ffffffffff600000 [452376.791650] exe[20251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452376.876874] exe[20185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452380.776618] warn_bad_vsyscall: 81 callbacks suppressed [452380.776622] exe[20169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.053582] exe[20411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.285245] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.344369] exe[20075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.603612] exe[434944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452381.899289] exe[20487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452382.136420] exe[64115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452382.427228] exe[20609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452383.100617] exe[20411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452383.231624] exe[20099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452387.563018] warn_bad_vsyscall: 6 callbacks suppressed [452387.563021] exe[20676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452390.388727] exe[434968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452390.748784] exe[434984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.391785] exe[20108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.694170] exe[435114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452393.852582] exe[20108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [452395.075739] exe[64115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6ae182506 cs:33 sp:7f87b2e368e8 ax:ffffffffff600000 si:7f87b2e36e08 di:ffffffffff600000 [453839.883317] exe[631930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.323036] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.350283] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.384432] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.416687] exe[680384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.455576] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.488414] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.519004] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.554215] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453840.584418] exe[661046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654fdaa6506 cs:33 sp:7f637ff358e8 ax:ffffffffff600000 si:7f637ff35e08 di:ffffffffff600000 [453926.991119] warn_bad_vsyscall: 89 callbacks suppressed [453926.991123] exe[603201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c86f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [453927.250974] exe[603330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c86f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [453928.195296] exe[703378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599c8c74506 cs:33 sp:7f4948c44f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [454782.238075] exe[396221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.124977] exe[459049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.183247] exe[445693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db8fdd8e8 ax:ffffffffff600000 si:7f4db8fdde08 di:ffffffffff600000 [454783.450566] exe[372606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94548e8 ax:ffffffffff600000 si:7f4db9454e08 di:ffffffffff600000 [454783.503948] exe[372606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56004cad4506 cs:33 sp:7f4db94338e8 ax:ffffffffff600000 si:7f4db9433e08 di:ffffffffff600000 [458511.597367] exe[507232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [458511.806667] exe[521019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [458511.991710] exe[501394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c649c1378 cs:33 sp:7f7ca9427f90 ax:7f7ca9428020 si:ffffffffff600000 di:561c64a8b263 [459012.705765] exe[563613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459012.872407] exe[594293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459012.986079] exe[593070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edd1f7378 cs:33 sp:7f614e857f90 ax:7f614e858020 si:ffffffffff600000 di:556edd2c1263 [459068.840155] exe[565482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [459069.513267] exe[582378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [459069.652731] exe[549515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e06a0e6506 cs:33 sp:7f0c53039f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [460974.883142] exe[869775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [460975.093493] exe[497807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [460975.226389] exe[846635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c058aab506 cs:33 sp:7f21a29488e8 ax:ffffffffff600000 si:7f21a2948e08 di:ffffffffff600000 [461621.505252] exe[911237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846468e8 ax:ffffffffff600000 si:7fc384646e08 di:ffffffffff600000 [461621.622374] exe[912332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846258e8 ax:ffffffffff600000 si:7fc384625e08 di:ffffffffff600000 [461621.768807] exe[960374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646b3042506 cs:33 sp:7fc3846468e8 ax:ffffffffff600000 si:7fc384646e08 di:ffffffffff600000 [461801.274870] exe[17419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461801.513112] exe[2380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461802.102011] exe[527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461802.104043] exe[17522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc566f90 ax:7f4efc567020 si:ffffffffff600000 di:5631f5faa263 [461910.586774] exe[36246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461910.699507] exe[36246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [461910.762959] exe[38204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.494148] exe[36375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.594008] exe[54110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.624504] exe[999751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464315.754307] exe[331082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f5ee0378 cs:33 sp:7f4efc587f90 ax:7f4efc588020 si:ffffffffff600000 di:5631f5faa263 [464426.407828] exe[228281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.661275] exe[228258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.713248] exe[228258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464426.910976] exe[228281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564336651378 cs:33 sp:7fb1a319df90 ax:7fb1a319e020 si:ffffffffff600000 di:56433671b263 [464778.939051] exe[440307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebf9f90 ax:7fe36ebfa020 si:ffffffffff600000 di:55a65d02f263 [464779.412182] exe[432089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebf9f90 ax:7fe36ebfa020 si:ffffffffff600000 di:55a65d02f263 [464779.648195] exe[434189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a65cf65378 cs:33 sp:7fe36ebb7f90 ax:7fe36ebb8020 si:ffffffffff600000 di:55a65d02f263 [465117.767639] exe[396252] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465119.063660] exe[398309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.142447] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.307108] exe[125097] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.443573] exe[172292] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.539664] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.620290] exe[401105] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.845479] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465120.938287] exe[74895] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465121.014719] exe[398309] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.820298] warn_bad_vsyscall: 22 callbacks suppressed [465122.820300] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.867136] exe[76377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.950259] exe[78164] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465122.992513] exe[181488] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.083877] exe[399798] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.102595] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.176201] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.249117] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.349779] exe[982588] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465123.398268] exe[948214] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [465178.032934] warn_bad_vsyscall: 5 callbacks suppressed [465178.032937] exe[412069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790eadf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465178.454081] exe[407255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790eadf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465178.857302] exe[389487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1a5a13506 cs:33 sp:7f6790e8cf88 ax:ffffffffff600000 si:20000840 di:ffffffffff600000 [465303.071148] exe[437548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465303.262589] exe[450736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465303.474127] exe[523237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556edc895378 cs:33 sp:7f478ea48f90 ax:7f478ea49020 si:ffffffffff600000 di:556edc95f263 [465419.445545] exe[482493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465419.803707] exe[425776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465419.857203] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.080303] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.110220] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.147047] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.173532] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.214517] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.243743] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [465420.271390] exe[425151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630928af378 cs:33 sp:7f560cf03f90 ax:7f560cf04020 si:ffffffffff600000 di:563092979263 [468653.293283] warn_bad_vsyscall: 58 callbacks suppressed [468653.293286] exe[834229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f4481ff90 ax:7f8f44820020 si:ffffffffff600000 di:55ff4cb2e263 [468653.662372] exe[943734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f443ddf90 ax:7f8f443de020 si:ffffffffff600000 di:55ff4cb2e263 [468654.169956] exe[807744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4ca64378 cs:33 sp:7f8f4481ff90 ax:7f8f44820020 si:ffffffffff600000 di:55ff4cb2e263 [469521.763903] exe[187406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469521.865137] exe[188177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469521.948983] exe[188197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [469795.157580] exe[203819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469796.083194] exe[203667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469796.194673] exe[203819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [469897.990110] exe[96084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584809da378 cs:33 sp:7fcac8b08f90 ax:7fcac8b09020 si:ffffffffff600000 di:558480aa4263 [469934.689791] exe[103783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e4b6d378 cs:33 sp:7f6df914ef90 ax:7f6df914f020 si:ffffffffff600000 di:5616e4c37263 [469959.251151] exe[123458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c6c56c378 cs:33 sp:7fa214269f90 ax:7fa21426a020 si:ffffffffff600000 di:556c6c636263 [469964.324146] exe[766830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d84aca5378 cs:33 sp:7fdce428af90 ax:7fdce428b020 si:ffffffffff600000 di:55d84ad6f263 [469964.498312] exe[159485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643e0c63378 cs:33 sp:7fc80c55bf90 ax:7fc80c55c020 si:ffffffffff600000 di:5643e0d2d263 [470005.029795] exe[261324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8ce652378 cs:33 sp:7ee12c0c7f90 ax:7ee12c0c8020 si:ffffffffff600000 di:55a8ce71c263 [470063.582095] exe[223157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebad466378 cs:33 sp:7fe114595f90 ax:7fe114596020 si:ffffffffff600000 di:55ebad530263 [470156.097825] exe[230225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5bf458378 cs:33 sp:7f7678cd8f90 ax:7f7678cd9020 si:ffffffffff600000 di:55e5bf522263 [470232.273906] exe[295772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e510ea378 cs:33 sp:7ef86efd5f90 ax:7ef86efd6020 si:ffffffffff600000 di:558e511b4263 [470274.610481] exe[149329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b59b89f378 cs:33 sp:7f98f2ca9f90 ax:7f98f2caa020 si:ffffffffff600000 di:55b59b969263 [470291.063893] exe[304135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7938348e8 ax:ffffffffff600000 si:7ea793834e08 di:ffffffffff600000 [470291.259202] exe[304157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7938348e8 ax:ffffffffff600000 si:7ea793834e08 di:ffffffffff600000 [470291.429296] exe[304186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559729bee506 cs:33 sp:7ea7933dd8e8 ax:ffffffffff600000 si:7ea7933dde08 di:ffffffffff600000 [470342.657336] exe[187967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e52a305378 cs:33 sp:7f821fffef90 ax:7f821ffff020 si:ffffffffff600000 di:55e52a3cf263 [470650.325703] exe[362231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575d4aad378 cs:33 sp:7ea12a708f90 ax:7ea12a709020 si:ffffffffff600000 di:5575d4b77263 [470750.386241] exe[199507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56297e927378 cs:33 sp:7f736d7fcf90 ax:7f736d7fd020 si:ffffffffff600000 di:56297e9f1263 [470929.605855] exe[211408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [470929.864255] exe[211408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [470929.867536] exe[212707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b71f90 ax:7f1b01b72020 si:ffffffffff600000 di:5570f4e5a263 [470930.200697] exe[223353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f4d90378 cs:33 sp:7f1b01b92f90 ax:7f1b01b93020 si:ffffffffff600000 di:5570f4e5a263 [471390.014371] exe[51668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471390.140633] exe[51668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471390.304896] exe[224047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580e3088506 cs:33 sp:7f875ac208e8 ax:ffffffffff600000 si:7f875ac20e08 di:ffffffffff600000 [471643.332270] exe[312935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [471643.806506] exe[313686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [471644.042859] exe[311449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d1e92506 cs:33 sp:7f69339088e8 ax:ffffffffff600000 si:7f6933908e08 di:ffffffffff600000 [473434.171293] exe[556303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788f08e8 ax:ffffffffff600000 si:7f67788f0e08 di:ffffffffff600000 [473434.462856] exe[556897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788f08e8 ax:ffffffffff600000 si:7f67788f0e08 di:ffffffffff600000 [473434.590169] exe[584003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c17a328506 cs:33 sp:7fac627fe8e8 ax:ffffffffff600000 si:7fac627fee08 di:ffffffffff600000 [473434.742395] exe[378120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b4fb42506 cs:33 sp:7f67788cf8e8 ax:ffffffffff600000 si:7f67788cfe08 di:ffffffffff600000 [475531.985713] exe[955127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e6df88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [475534.647773] exe[955520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e4cf88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [475535.014743] exe[842220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e67263506 cs:33 sp:7fbdf4e6df88 ax:ffffffffff600000 si:20006500 di:ffffffffff600000 [476428.183885] exe[254431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee8abf90 ax:7fe8ee8ac020 si:ffffffffff600000 di:561d26249263 [476428.429002] exe[266248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee88af90 ax:7fe8ee88b020 si:ffffffffff600000 di:561d26249263 [476428.674038] exe[254526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d2617f378 cs:33 sp:7fe8ee8abf90 ax:7fe8ee8ac020 si:ffffffffff600000 di:561d26249263 [476836.073376] exe[967895] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476836.725506] exe[230071] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476837.234892] exe[327470] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [476837.379177] exe[237748] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [477324.454399] exe[862632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.608197] exe[862872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.645374] exe[862862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455bcf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477324.826559] exe[181805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638666b7506 cs:33 sp:7f1c455fef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [477552.522007] exe[443515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071372cf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [477552.700306] exe[443336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071370bf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [477552.809114] exe[443232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a4964506 cs:33 sp:7f071372cf88 ax:ffffffffff600000 si:20002c80 di:ffffffffff600000 [478002.753162] exe[423620] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [478003.202873] exe[225170] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [478003.679956] exe[324851] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [481141.030672] exe[911967] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [481142.245128] exe[998512] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [481142.914132] exe[998499] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [482453.684749] exe[82438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482453.852372] exe[228268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482454.381147] exe[80367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b62d532378 cs:33 sp:7f20718f3f90 ax:7f20718f4020 si:ffffffffff600000 di:55b62d5fc263 [482579.862151] exe[210610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.195219] exe[968597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.298293] exe[957948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482580.509187] exe[787994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563efa45e506 cs:33 sp:7fc140ae48e8 ax:ffffffffff600000 si:7fc140ae4e08 di:ffffffffff600000 [482994.972200] exe[9557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.185185] exe[343640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.334686] exe[9557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d34f90 ax:7ff653d35020 si:ffffffffff600000 di:56470fcd2263 [482995.335306] exe[9408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56470fc08378 cs:33 sp:7ff653d13f90 ax:7ff653d14020 si:ffffffffff600000 di:56470fcd2263 [483562.880290] exe[464727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483563.788436] exe[464848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40ca8e8 ax:ffffffffff600000 si:7ed0e40cae08 di:ffffffffff600000 [483563.790083] exe[464847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483564.662126] exe[464983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca5c42d506 cs:33 sp:7ed0e40eb8e8 ax:ffffffffff600000 si:7ed0e40ebe08 di:ffffffffff600000 [483607.993920] exe[373867] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483608.537312] exe[241301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483608.960255] exe[241301] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [483997.435548] exe[518836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.529943] exe[523606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.718422] exe[531932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [483997.788834] exe[523606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d37b12506 cs:33 sp:7f228eefd8e8 ax:ffffffffff600000 si:7f228eefde08 di:ffffffffff600000 [484247.493583] exe[416475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484247.701073] exe[357324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484247.818993] exe[357324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e1d83a378 cs:33 sp:7fc65ef37f90 ax:7fc65ef38020 si:ffffffffff600000 di:562e1d904263 [484624.077077] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.185140] exe[599425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.233037] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484624.464316] exe[597183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [484843.969145] exe[664838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d0c08e8 ax:ffffffffff600000 si:7ffa8d0c0e08 di:ffffffffff600000 [484844.677141] exe[664666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d0c08e8 ax:ffffffffff600000 si:7ffa8d0c0e08 di:ffffffffff600000 [484844.724668] exe[664655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.842072] exe[664814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.875441] exe[664882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.903394] exe[664876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.933390] exe[664704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.963966] exe[664704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484844.992510] exe[664870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [484845.021333] exe[664870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601a1940506 cs:33 sp:7ffa8d09f8e8 ax:ffffffffff600000 si:7ffa8d09fe08 di:ffffffffff600000 [485357.629810] warn_bad_vsyscall: 26 callbacks suppressed [485357.629813] exe[752771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [485357.762180] exe[752804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [485357.828618] exe[752813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfd7e8e8 ax:ffffffffff600000 si:7edbdfd7ee08 di:ffffffffff600000 [485358.264730] exe[752858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630bd984506 cs:33 sp:7edbdfdc08e8 ax:ffffffffff600000 si:7edbdfdc0e08 di:ffffffffff600000 [486138.984904] exe[909799] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486139.718931] exe[553769] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486140.260970] exe[120731] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486140.486949] exe[911905] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [486385.904716] exe[798124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.280569] exe[798124] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.607482] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.629603] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.653764] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.677480] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.708537] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.732590] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.785549] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486386.826387] exe[907411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.653818] warn_bad_vsyscall: 57 callbacks suppressed [486561.653821] exe[796855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.836794] exe[951632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486561.867103] exe[951621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486562.208045] exe[952705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486562.236295] exe[952705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a089c19378 cs:33 sp:7f3f173dcf90 ax:7f3f173dd020 si:ffffffffff600000 di:55a089ce3263 [486672.542707] exe[825184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8e78e8 ax:ffffffffff600000 si:7f858d8e7e08 di:ffffffffff600000 [486673.497112] exe[825184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8e78e8 ax:ffffffffff600000 si:7f858d8e7e08 di:ffffffffff600000 [486674.626614] exe[530007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648c896b506 cs:33 sp:7f858d8c68e8 ax:ffffffffff600000 si:7f858d8c6e08 di:ffffffffff600000 [486874.081545] exe[560872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f391ff90 ax:7fd2f3920020 si:ffffffffff600000 di:560e13c20263 [486874.510186] exe[596877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f389bf90 ax:7fd2f389c020 si:ffffffffff600000 di:560e13c20263 [486875.104166] exe[613238] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f38bcf90 ax:7fd2f38bd020 si:ffffffffff600000 di:560e13c20263 [486875.113300] exe[627247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e13b56378 cs:33 sp:7fd2f38fef90 ax:7fd2f38ff020 si:ffffffffff600000 di:560e13c20263 [487047.654469] exe[960793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d26aff90 ax:7f85d26b0020 si:ffffffffff600000 di:55c0beede263 [487047.773269] exe[22432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d26aff90 ax:7f85d26b0020 si:ffffffffff600000 di:55c0beede263 [487047.798937] exe[960793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d268ef90 ax:7f85d268f020 si:ffffffffff600000 di:55c0beede263 [487047.885522] exe[960732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c0bee14378 cs:33 sp:7f85d268ef90 ax:7f85d268f020 si:ffffffffff600000 di:55c0beede263 [489064.946551] exe[794530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57628e8 ax:ffffffffff600000 si:7f60a5762e08 di:ffffffffff600000 [489065.240439] exe[154851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57418e8 ax:ffffffffff600000 si:7f60a5741e08 di:ffffffffff600000 [489065.594933] exe[154851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57628e8 ax:ffffffffff600000 si:7f60a5762e08 di:ffffffffff600000 [489065.652354] exe[327189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b6b5c506 cs:33 sp:7f60a57418e8 ax:ffffffffff600000 si:7f60a5741e08 di:ffffffffff600000 [492227.876759] exe[810857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492228.095459] exe[809201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492228.282632] exe[820192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c10a3506 cs:33 sp:7fbb3c9fe8e8 ax:ffffffffff600000 si:7fbb3c9fee08 di:ffffffffff600000 [492236.097033] exe[818993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492238.950535] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492238.979619] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.010014] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.039759] exe[810354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.068208] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.100012] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.131041] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.162624] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [492239.192724] exe[819248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c14e93506 cs:33 sp:7fd8d6bf78e8 ax:ffffffffff600000 si:7fd8d6bf7e08 di:ffffffffff600000 [493355.860552] warn_bad_vsyscall: 25 callbacks suppressed [493355.860555] exe[16428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556418eb2506 cs:33 sp:7eaf25e2a8e8 ax:ffffffffff600000 si:7eaf25e2ae08 di:ffffffffff600000 [493385.866795] exe[13602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [493386.099883] exe[990844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [493386.145033] exe[990844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2c2f90 ax:7fde5a2c3020 si:ffffffffff600000 di:5607d0805263 [493386.531715] exe[958211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607d073b378 cs:33 sp:7fde5a2e3f90 ax:7fde5a2e4020 si:ffffffffff600000 di:5607d0805263 [499403.618694] exe[577154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.213309] exe[577058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.598524] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.642197] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.676405] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.711719] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.755062] exe[577058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.794288] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.829192] exe[593287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499404.859253] exe[577068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a0432506 cs:33 sp:7f8f85b2ef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [499574.807222] warn_bad_vsyscall: 25 callbacks suppressed [499574.807225] exe[792507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499575.542140] exe[81138] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499575.695813] exe[931612] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499576.241749] exe[792507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [499682.792330] exe[885453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [499683.358090] exe[885346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [499684.030110] exe[891018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f89a04378 cs:33 sp:7fd5a1370f90 ax:7fd5a1371020 si:ffffffffff600000 di:555f89ace263 [502018.711967] exe[251699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502018.944862] exe[248613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502019.210854] exe[239250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [502857.890467] exe[380446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a638e8 ax:ffffffffff600000 si:7ea240a63e08 di:ffffffffff600000 [502858.937796] exe[380602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a218e8 ax:ffffffffff600000 si:7ea240a21e08 di:ffffffffff600000 [502859.765766] exe[380699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052ff6506 cs:33 sp:7ea240a638e8 ax:ffffffffff600000 si:7ea240a63e08 di:ffffffffff600000 [503806.324621] exe[511481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [503806.627890] exe[511145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [503807.050146] exe[391986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a545f5506 cs:33 sp:7f209a2e28e8 ax:ffffffffff600000 si:7f209a2e2e08 di:ffffffffff600000 [507676.373579] exe[690142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507676.548866] exe[689857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507676.730773] exe[689857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efbe524506 cs:33 sp:7fcf7f0658e8 ax:ffffffffff600000 si:7fcf7f065e08 di:ffffffffff600000 [507763.555050] exe[107808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.242476] exe[157535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.594719] exe[116576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7f06f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507764.594763] exe[68833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b48822506 cs:33 sp:7fc7c7ee5f88 ax:ffffffffff600000 si:20000700 di:ffffffffff600000 [507834.294723] exe[113402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [507834.591252] exe[70450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [507834.786964] exe[113372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55572e578506 cs:33 sp:7fd8aac828e8 ax:ffffffffff600000 si:7fd8aac82e08 di:ffffffffff600000 [508002.202321] exe[111898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [508002.639586] exe[14547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [508003.200103] exe[71611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5ddf90 ax:7fce6c5de020 si:ffffffffff600000 di:556caa0e6263 [508229.235140] exe[181353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.521159] exe[234914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.561667] exe[194352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.570204] exe[239233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.610169] exe[157326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.624384] exe[239234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.638426] exe[194352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.653657] exe[145835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.660643] exe[89644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [508229.667222] exe[86216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de06bef101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [509817.688040] warn_bad_vsyscall: 25 callbacks suppressed [509817.688044] exe[477636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.028139] exe[473790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.408974] exe[477601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5fef90 ax:7fce6c5ff020 si:ffffffffff600000 di:556caa0e6263 [509818.520065] exe[477712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556caa01c378 cs:33 sp:7fce6c5bcf90 ax:7fce6c5bd020 si:ffffffffff600000 di:556caa0e6263 [509929.138239] exe[247549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [509929.820995] exe[306749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [509930.508972] exe[78331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648f253d506 cs:33 sp:7f9389decf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [510227.095681] exe[520551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510227.555215] exe[112835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510228.013949] exe[112909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.150431] exe[64604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.481296] exe[519181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510246.819665] exe[12094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a611a3378 cs:33 sp:7f107dea4f90 ax:7f107dea5020 si:ffffffffff600000 di:564a6126d263 [510890.003890] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [510890.290614] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.320039] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.344966] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.378890] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.408705] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.434485] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.456131] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.497522] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [510890.527738] exe[627812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [511128.415067] warn_bad_vsyscall: 26 callbacks suppressed [511128.415071] exe[431091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511128.619822] exe[557068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511129.014515] exe[546219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55815c433506 cs:33 sp:7fe6d5fd58e8 ax:ffffffffff600000 si:7fe6d5fd5e08 di:ffffffffff600000 [511130.514600] exe[384929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511130.785346] exe[408329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511131.153389] exe[545786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511131.325754] exe[477249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623bc451506 cs:33 sp:7f29b8b478e8 ax:ffffffffff600000 si:7f29b8b47e08 di:ffffffffff600000 [511815.561794] exe[716451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511815.816348] exe[727406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba992ef90 ax:7fcba992f020 si:ffffffffff600000 di:557740caa263 [511815.818156] exe[727441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511816.284611] exe[727441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [511817.183958] exe[365286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511817.344225] exe[365154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511817.658146] exe[365183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb450f378 cs:33 sp:7f00ad3b7f90 ax:7f00ad3b8020 si:ffffffffff600000 di:559fb45d9263 [511896.404978] exe[780755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511897.469127] exe[759203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511897.628082] exe[758251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5bc8e8 ax:ffffffffff600000 si:7f7b8e5bce08 di:ffffffffff600000 [511898.485985] exe[754156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5fe8e8 ax:ffffffffff600000 si:7f7b8e5fee08 di:ffffffffff600000 [511898.487710] exe[761872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e67d38a506 cs:33 sp:7f7b8e5dd8e8 ax:ffffffffff600000 si:7f7b8e5dde08 di:ffffffffff600000 [513091.472849] exe[954885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.621861] exe[958308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.800603] exe[958308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513091.830744] exe[999670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56484d3dc378 cs:33 sp:7f6b6ff23f90 ax:7f6b6ff24020 si:ffffffffff600000 di:56484d4a6263 [513118.279835] exe[739299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513121.253454] exe[824157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513124.363273] exe[792443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558591d16506 cs:33 sp:7f8c4944a8e8 ax:ffffffffff600000 si:7f8c4944ae08 di:ffffffffff600000 [513130.358952] exe[8820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513130.924248] exe[8926] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513131.311077] exe[8989] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [513347.499721] exe[844338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [513347.745548] exe[786962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [513348.026638] exe[786962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557740be0378 cs:33 sp:7fcba994ff90 ax:7fcba9950020 si:ffffffffff600000 di:557740caa263 [514382.611721] exe[160258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [514382.956334] exe[159801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [514383.250979] exe[155805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726ecf2506 cs:33 sp:7fd8babc58e8 ax:ffffffffff600000 si:7fd8babc5e08 di:ffffffffff600000 [516619.624744] exe[600647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [516619.810220] exe[600678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [516619.997097] exe[600706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ceff10d506 cs:33 sp:7ed4cbcd08e8 ax:ffffffffff600000 si:7ed4cbcd0e08 di:ffffffffff600000 [518635.151335] exe[785129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831ee8e8 ax:ffffffffff600000 si:7efd831eee08 di:ffffffffff600000 [518635.398875] exe[881597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831cd8e8 ax:ffffffffff600000 si:7efd831cde08 di:ffffffffff600000 [518635.762522] exe[686801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d653abb506 cs:33 sp:7efd831cd8e8 ax:ffffffffff600000 si:7efd831cde08 di:ffffffffff600000 [519061.609108] exe[993392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549e68e8 ax:ffffffffff600000 si:7fb4549e6e08 di:ffffffffff600000 [519062.146104] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.176245] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.204643] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.237218] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.278344] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.326524] exe[993036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.362003] exe[993488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.398938] exe[994658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519062.434310] exe[994658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635d793e506 cs:33 sp:7fb4549a48e8 ax:ffffffffff600000 si:7fb4549a4e08 di:ffffffffff600000 [519321.224856] warn_bad_vsyscall: 35 callbacks suppressed [519321.224859] exe[7914] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519322.071890] exe[7914] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519322.349270] exe[831034] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519323.101910] exe[828564] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [519418.938113] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519419.124785] exe[810476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519419.422323] exe[810476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb713fe8e8 ax:ffffffffff600000 si:7fbb713fee08 di:ffffffffff600000 [519423.313138] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519423.759529] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.048624] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.169793] exe[761856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.460945] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.621292] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.728570] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519424.918809] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.249385] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.475756] exe[840385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.658520] exe[763655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519425.782660] exe[761887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [519554.112540] warn_bad_vsyscall: 2 callbacks suppressed [519554.112543] exe[874461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdd792a506 cs:33 sp:7fa6b13878e8 ax:ffffffffff600000 si:7fa6b1387e08 di:ffffffffff600000 [519557.501878] exe[873844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8089b6506 cs:33 sp:7fc10e5da8e8 ax:ffffffffff600000 si:7fc10e5dae08 di:ffffffffff600000 [519577.659059] exe[82765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562820fde506 cs:33 sp:7eedab7498e8 ax:ffffffffff600000 si:7eedab749e08 di:ffffffffff600000 [519584.738552] exe[58078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ec998506 cs:33 sp:7f7efb3758e8 ax:ffffffffff600000 si:7f7efb375e08 di:ffffffffff600000 [519609.379371] exe[87803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e22475506 cs:33 sp:7ecf647c48e8 ax:ffffffffff600000 si:7ecf647c4e08 di:ffffffffff600000 [519628.989576] exe[48441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564466748506 cs:33 sp:7f97b97ab8e8 ax:ffffffffff600000 si:7f97b97abe08 di:ffffffffff600000 [519697.399147] exe[895286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603c8fa3506 cs:33 sp:7f4b665dd8e8 ax:ffffffffff600000 si:7f4b665dde08 di:ffffffffff600000 [519707.756372] exe[104920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c88c8b506 cs:33 sp:7ed8729d38e8 ax:ffffffffff600000 si:7ed8729d3e08 di:ffffffffff600000 [519736.385951] exe[860627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb11993506 cs:33 sp:7fddf2dfe8e8 ax:ffffffffff600000 si:7fddf2dfee08 di:ffffffffff600000 [519753.822489] exe[767301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d23e394506 cs:33 sp:7f9173acb8e8 ax:ffffffffff600000 si:7f9173acbe08 di:ffffffffff600000 [519757.057066] exe[845317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4ddde1506 cs:33 sp:7fd109fa48e8 ax:ffffffffff600000 si:7fd109fa4e08 di:ffffffffff600000 [519876.439182] exe[897410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55831b9be506 cs:33 sp:7fbda526b8e8 ax:ffffffffff600000 si:7fbda526be08 di:ffffffffff600000 [520444.488006] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520445.299834] exe[761888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520445.385694] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720238e8 ax:ffffffffff600000 si:7fbb72023e08 di:ffffffffff600000 [520445.886983] exe[761828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520523.027897] exe[164351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556adf84e506 cs:33 sp:7fbb720448e8 ax:ffffffffff600000 si:7fbb72044e08 di:ffffffffff600000 [520931.370358] exe[870454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520931.923159] exe[174239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520931.971734] exe[25569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [520932.363924] exe[165825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389a50b506 cs:33 sp:7fbea9fba8e8 ax:ffffffffff600000 si:7fbea9fbae08 di:ffffffffff600000 [521530.430303] exe[914217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521530.809464] exe[79751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521531.087883] exe[914209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521531.090430] exe[941552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1a18e8 ax:ffffffffff600000 si:7f6c6b1a1e08 di:ffffffffff600000 [521621.624046] exe[963438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521621.887665] exe[963438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521622.143566] exe[971836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [521622.601686] exe[914183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff64ff9506 cs:33 sp:7f6c6b1c28e8 ax:ffffffffff600000 si:7f6c6b1c2e08 di:ffffffffff600000 [522165.620567] exe[375382] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [522166.674687] exe[755888] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [522167.315216] exe[665740] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [523335.356992] exe[851722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8da4e2378 cs:33 sp:7f19bb7b1f90 ax:7f19bb7b2020 si:ffffffffff600000 di:55d8da5ac263 [523696.719807] exe[790620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.141183] exe[864062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.288853] exe[867590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523697.294448] exe[760978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523697.493039] exe[949043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523697.683429] exe[757522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523697.858882] exe[866385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523697.980507] exe[762875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3af883506 cs:33 sp:7ff0c439d8e8 ax:ffffffffff600000 si:7ff0c439de08 di:ffffffffff600000 [523698.082404] exe[757793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e81a63506 cs:33 sp:7f16d7a748e8 ax:ffffffffff600000 si:7f16d7a74e08 di:ffffffffff600000 [523698.157597] exe[866398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffab25a506 cs:33 sp:7fc11aa748e8 ax:ffffffffff600000 si:7fc11aa74e08 di:ffffffffff600000 [523813.200318] warn_bad_vsyscall: 3 callbacks suppressed [523813.200322] exe[4485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.402664] exe[4544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.562744] exe[4588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [523813.794163] exe[4651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c75835506 cs:33 sp:7ef17797f8e8 ax:ffffffffff600000 si:7ef17797fe08 di:ffffffffff600000 [524483.221410] exe[974370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524483.986373] exe[670258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524484.576826] exe[670258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524485.259417] exe[664199] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524486.000132] exe[655157] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524486.694731] exe[143088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524487.323887] exe[143088] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [524521.795839] exe[32549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524521.937888] exe[32485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524522.111490] exe[901157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [524522.967578] exe[887460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cebff6506 cs:33 sp:7f73398608e8 ax:ffffffffff600000 si:7f7339860e08 di:ffffffffff600000 [525522.940667] exe[416708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55857eee5378 cs:33 sp:7f8a4335cf90 ax:7f8a4335d020 si:ffffffffff600000 di:55857efaf263 [525651.344079] exe[264297] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525651.878001] exe[408128] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525652.407038] exe[256257] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525652.906015] exe[264297] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525653.457756] exe[353684] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525654.025172] exe[331213] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525654.424978] exe[330764] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [525868.775236] exe[487327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.002201] exe[487258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.160146] exe[516330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [525869.264758] exe[487258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55644c526506 cs:33 sp:7fcbb5f0b8e8 ax:ffffffffff600000 si:7fcbb5f0be08 di:ffffffffff600000 [526229.543336] exe[615841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ba44e1506 cs:33 sp:7ee56b3998e8 ax:ffffffffff600000 si:7ee56b399e08 di:ffffffffff600000 [526560.550369] exe[580360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526560.858054] exe[564651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526561.074815] exe[632591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [526561.569258] exe[603555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec9cbe4506 cs:33 sp:7f5dec42f8e8 ax:ffffffffff600000 si:7f5dec42fe08 di:ffffffffff600000 [527280.050423] exe[622623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527280.903115] exe[626020] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527281.858410] exe[677920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527282.403610] exe[622623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527497.018577] exe[779920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527497.729696] exe[779920] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527498.347855] exe[852623] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527499.201975] exe[856729] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [527811.303068] exe[918035] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527811.886300] exe[908844] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527812.297325] exe[909223] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [527812.974063] exe[923647] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [528496.349157] exe[499553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528496.541715] exe[487183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528496.932757] exe[921708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528497.209485] exe[487338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [528723.736962] exe[916903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b10db32378 cs:33 sp:7fbae4b7df90 ax:7fbae4b7e020 si:ffffffffff600000 di:55b10dbfc263 [528727.208941] exe[159029] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528727.820079] exe[134670] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528728.532737] exe[134670] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528729.016551] exe[118382] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528847.976578] exe[79475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8dd94f378 cs:33 sp:7f732c6a1f90 ax:7f732c6a2020 si:ffffffffff600000 di:55f8dda19263 [528979.712673] exe[253031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c1c9f378 cs:33 sp:7ede2a591f90 ax:7ede2a592020 si:ffffffffff600000 di:55d9c1d69263 [528995.176615] exe[38160] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [528999.994333] exe[60022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55794bac2378 cs:33 sp:7f68819e9f90 ax:7f68819ea020 si:ffffffffff600000 di:55794bb8c263 [529018.426746] exe[776579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555d5f02506 cs:33 sp:7f1727acc8e8 ax:ffffffffff600000 si:7f1727acce08 di:ffffffffff600000 [529022.319491] exe[261595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164526a378 cs:33 sp:7eb1d8a6cf90 ax:7eb1d8a6d020 si:ffffffffff600000 di:561645334263 [529166.570761] exe[118922] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [529202.234713] exe[89793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f313833506 cs:33 sp:7feb30c938e8 ax:ffffffffff600000 si:7feb30c93e08 di:ffffffffff600000 [529238.278836] exe[491819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eee85dd378 cs:33 sp:7f81ae34ff90 ax:7f81ae350020 si:ffffffffff600000 di:55eee86a7263 [529265.608604] exe[307877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561860943378 cs:33 sp:7eb3377bff90 ax:7eb3377c0020 si:ffffffffff600000 di:561860a0d263 [529278.926814] exe[751165] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [529356.590619] exe[284045] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [529373.548289] exe[234183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529373.738418] exe[250555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529373.994514] exe[155598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529374.220402] exe[155464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586621bb506 cs:33 sp:7f884018b8e8 ax:ffffffffff600000 si:7f884018be08 di:ffffffffff600000 [529445.975759] exe[905639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e81837c506 cs:33 sp:7fc0e81728e8 ax:ffffffffff600000 si:7fc0e8172e08 di:ffffffffff600000 [529483.167680] exe[302150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cb9c26506 cs:33 sp:7fd09f9fe8e8 ax:ffffffffff600000 si:7fd09f9fee08 di:ffffffffff600000 [529537.770697] exe[158011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555d5f02506 cs:33 sp:7f1727acc8e8 ax:ffffffffff600000 si:7f1727acce08 di:ffffffffff600000 [529563.427709] exe[201461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c94190378 cs:33 sp:7fa0b7a4ef90 ax:7fa0b7a4f020 si:ffffffffff600000 di:559c9425a263 [529616.622213] exe[377995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529618.355844] exe[378376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8a5fdf506 cs:33 sp:7ec9ac0258e8 ax:ffffffffff600000 si:7ec9ac025e08 di:ffffffffff600000 [529702.778780] exe[247417] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [529702.901762] exe[60022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55794bb11506 cs:33 sp:7f68819e98e8 ax:ffffffffff600000 si:7f68819e9e08 di:ffffffffff600000 [529776.598550] exe[406410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529776.811194] exe[406435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529777.092424] exe[406483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622c4e3d506 cs:33 sp:7ecaa32828e8 ax:ffffffffff600000 si:7ecaa3282e08 di:ffffffffff600000 [529777.296612] exe[406522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc9d368506 cs:33 sp:7ec0eacb68e8 ax:ffffffffff600000 si:7ec0eacb6e08 di:ffffffffff600000 [529777.504664] exe[406561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc9d368506 cs:33 sp:7ec0eacb68e8 ax:ffffffffff600000 si:7ec0eacb6e08 di:ffffffffff600000 [529792.584176] exe[409476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7a6e9506 cs:33 sp:7eb3e37fe8e8 ax:ffffffffff600000 si:7eb3e37fee08 di:ffffffffff600000 [529792.809749] exe[409520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e7a6e9506 cs:33 sp:7eb3e37fe8e8 ax:ffffffffff600000 si:7eb3e37fee08 di:ffffffffff600000 [529843.923692] exe[977610] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [529967.575924] exe[439863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55754c343506 cs:33 sp:7ec9cae4d8e8 ax:ffffffffff600000 si:7ec9cae4de08 di:ffffffffff600000 [530976.665860] exe[317657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [530976.862405] exe[318139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [530976.900219] exe[318033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a65dd8e8 ax:ffffffffff600000 si:7f42a65dde08 di:ffffffffff600000 [530977.163011] exe[317516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612630ab506 cs:33 sp:7f42a6a3e8e8 ax:ffffffffff600000 si:7f42a6a3ee08 di:ffffffffff600000 [531139.627279] exe[193418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613d41b5506 cs:33 sp:7f367482d8e8 ax:ffffffffff600000 si:7f367482de08 di:ffffffffff600000 [531183.971276] exe[611426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b4b2d1506 cs:33 sp:7f3dd54d58e8 ax:ffffffffff600000 si:7f3dd54d5e08 di:ffffffffff600000 [531788.700028] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c0c7c2506 cs:33 sp:7fb5ad28c8e8 ax:ffffffffff600000 si:7fb5ad28ce08 di:ffffffffff600000 [531916.930531] exe[832720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571c50a8378 cs:33 sp:7eb248902f90 ax:7eb248903020 si:ffffffffff600000 di:5571c5172263 [532080.424887] exe[868851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c67d66e506 cs:33 sp:7f53642478e8 ax:ffffffffff600000 si:7f5364247e08 di:ffffffffff600000 [532289.379359] exe[381920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560457a39506 cs:33 sp:7fdb4e12c8e8 ax:ffffffffff600000 si:7fdb4e12ce08 di:ffffffffff600000 [532560.574949] exe[656970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bca6b58506 cs:33 sp:7f265394e8e8 ax:ffffffffff600000 si:7f265394ee08 di:ffffffffff600000 [532769.375655] exe[812068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e6712c506 cs:33 sp:7f0a438af8e8 ax:ffffffffff600000 si:7f0a438afe08 di:ffffffffff600000 [533088.043283] exe[824650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e670dd378 cs:33 sp:7f0a438aff90 ax:7f0a438b0020 si:ffffffffff600000 di:558e671a7263 [533337.460065] exe[150292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558721cbd506 cs:33 sp:7fb56c8428e8 ax:ffffffffff600000 si:7fb56c842e08 di:ffffffffff600000 [534281.690946] exe[992018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4edd68506 cs:33 sp:7f108a9fe8e8 ax:ffffffffff600000 si:7f108a9fee08 di:ffffffffff600000 [534375.607574] exe[143055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3f3bfd506 cs:33 sp:7fc23d0d28e8 ax:ffffffffff600000 si:7fc23d0d2e08 di:ffffffffff600000 [535936.955346] exe[161642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [535937.540263] exe[146021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [535938.057834] exe[191075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620af861506 cs:33 sp:7f989778a8e8 ax:ffffffffff600000 si:7f989778ae08 di:ffffffffff600000 [536640.044057] exe[145533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536640.478184] exe[145533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536641.102847] exe[169864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560beec01506 cs:33 sp:7fc38fcf48e8 ax:ffffffffff600000 si:7fc38fcf4e08 di:ffffffffff600000 [536760.233015] exe[798427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [536760.494718] exe[777386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [536760.619426] exe[777178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e26145506 cs:33 sp:7f8bf75fe8e8 ax:ffffffffff600000 si:7f8bf75fee08 di:ffffffffff600000 [538376.728414] exe[762704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [538377.480726] exe[815485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [538378.006487] exe[756985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571e7f73506 cs:33 sp:7f90285f28e8 ax:ffffffffff600000 si:7f90285f2e08 di:ffffffffff600000 [542619.586953] exe[289803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.036619] exe[515700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.149058] exe[245662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757858e8 ax:ffffffffff600000 si:7f1775785e08 di:ffffffffff600000 [542620.639115] exe[242836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [542620.698491] exe[480473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c02b48506 cs:33 sp:7f17757e88e8 ax:ffffffffff600000 si:7f17757e8e08 di:ffffffffff600000 [545014.389683] exe[231699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545014.613362] exe[231739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545014.674664] exe[231739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [545015.075123] exe[231809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7d18e506 cs:33 sp:7eaf8b84e8e8 ax:ffffffffff600000 si:7eaf8b84ee08 di:ffffffffff600000 [547130.486912] exe[563254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29666608e8 ax:ffffffffff600000 si:7f2966660e08 di:ffffffffff600000 [547131.110726] exe[563388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29661dd8e8 ax:ffffffffff600000 si:7f29661dde08 di:ffffffffff600000 [547131.511512] exe[571393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564edbc51506 cs:33 sp:7f29666608e8 ax:ffffffffff600000 si:7f2966660e08 di:ffffffffff600000 [549634.232954] exe[951452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d549f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549634.487935] exe[951452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d507f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549634.634501] exe[979228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecb962e506 cs:33 sp:7f5e7d507f88 ax:ffffffffff600000 si:20000980 di:ffffffffff600000 [549637.495512] exe[971873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.796926] exe[774750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.834134] exe[774817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.868969] exe[774817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.900776] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.933044] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549637.963012] exe[774816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.239346] warn_bad_vsyscall: 110 callbacks suppressed [549639.239350] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.274044] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.302757] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.332294] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.361405] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.398767] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.429168] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [549639.462120] exe[736582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3fd1ce506 cs:33 sp:7efef17928e8 ax:ffffffffff600000 si:7efef1792e08 di:ffffffffff600000 [553443.422081] exe[428712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebfe8e8 ax:ffffffffff600000 si:7f944ebfee08 di:ffffffffff600000 [553443.696890] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.725457] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.768620] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.801135] exe[575441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.846453] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.875838] exe[597290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.909234] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.937997] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [553443.967254] exe[574770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561de5d31506 cs:33 sp:7f944ebdd8e8 ax:ffffffffff600000 si:7f944ebdde08 di:ffffffffff600000 [554063.082514] warn_bad_vsyscall: 25 callbacks suppressed [554063.082518] exe[933259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e957f90 ax:7f609e958020 si:ffffffffff600000 di:55fe1eba8263 [554063.832690] exe[934247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e915f90 ax:7f609e916020 si:ffffffffff600000 di:55fe1eba8263 [554064.792029] exe[953802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1eade378 cs:33 sp:7f609e957f90 ax:7f609e958020 si:ffffffffff600000 di:55fe1eba8263 [555963.709679] exe[145884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555963.921954] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.211241] exe[124886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.240005] exe[124578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.272625] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.312913] exe[266845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.346670] exe[266845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.382518] exe[135242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.420817] exe[265849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [555964.454434] exe[265849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621691ee506 cs:33 sp:7fdcc74c68e8 ax:ffffffffff600000 si:7fdcc74c6e08 di:ffffffffff600000 [556474.533301] warn_bad_vsyscall: 25 callbacks suppressed [556474.533304] exe[432030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.111363] exe[432030] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.201462] exe[430822] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.234523] exe[431820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.297770] exe[431820] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.300962] exe[332963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.317176] exe[431225] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.382899] exe[432571] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.403086] exe[408776] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556475.445979] exe[333239] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556479.591895] warn_bad_vsyscall: 55 callbacks suppressed [556479.591898] exe[432784] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556480.700484] exe[432591] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [556480.783839] exe[332963] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [560888.788106] exe[203416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560888.962471] exe[203402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.089080] exe[135636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8388e8 ax:ffffffffff600000 si:7fc8dc838e08 di:ffffffffff600000 [560889.195751] exe[135636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.282307] exe[203402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.399058] exe[135796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [560889.519987] exe[135796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557292938506 cs:33 sp:7fc8dc8598e8 ax:ffffffffff600000 si:7fc8dc859e08 di:ffffffffff600000 [561529.897718] exe[277782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.482132] exe[277761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.637683] exe[277834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be34e23506 cs:33 sp:7f7c6bbbb8e8 ax:ffffffffff600000 si:7f7c6bbbbe08 di:ffffffffff600000 [561530.809671] exe[299983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f8298e3f8e8 ax:ffffffffff600000 si:7f8298e3fe08 di:ffffffffff600000 [561530.815400] exe[277788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f9d649506 cs:33 sp:7f82989fe8e8 ax:ffffffffff600000 si:7f82989fee08 di:ffffffffff600000 [561796.091845] exe[419501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afbbaaf506 cs:33 sp:7fe86c4298e8 ax:ffffffffff600000 si:7fe86c429e08 di:ffffffffff600000 [561825.289170] exe[453764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dd4aa0506 cs:33 sp:7ee4439b48e8 ax:ffffffffff600000 si:7ee4439b4e08 di:ffffffffff600000 [561848.913208] exe[456224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563722589506 cs:33 sp:7f84c0dfe8e8 ax:ffffffffff600000 si:7f84c0dfee08 di:ffffffffff600000 [561851.319932] exe[460050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2debf0506 cs:33 sp:7ecc3c4a28e8 ax:ffffffffff600000 si:7ecc3c4a2e08 di:ffffffffff600000 [561915.585583] exe[323976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed99aff506 cs:33 sp:7ff37c9128e8 ax:ffffffffff600000 si:7ff37c912e08 di:ffffffffff600000 [561934.020955] exe[998115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570c326c506 cs:33 sp:7f668577e8e8 ax:ffffffffff600000 si:7f668577ee08 di:ffffffffff600000 [561953.664675] exe[277469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d35272506 cs:33 sp:7fbd0361f8e8 ax:ffffffffff600000 si:7fbd0361fe08 di:ffffffffff600000 [561970.437671] exe[72377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609b785e506 cs:33 sp:7fd994ee68e8 ax:ffffffffff600000 si:7fd994ee6e08 di:ffffffffff600000 [561984.281690] exe[402761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad91478506 cs:33 sp:7ff70f92f8e8 ax:ffffffffff600000 si:7ff70f92fe08 di:ffffffffff600000 [562036.627996] exe[626449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adf06ee506 cs:33 sp:7ff46a6ec8e8 ax:ffffffffff600000 si:7ff46a6ece08 di:ffffffffff600000 [562074.540203] exe[502407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5b65b5506 cs:33 sp:7ece633828e8 ax:ffffffffff600000 si:7ece63382e08 di:ffffffffff600000 [562142.632482] exe[721438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fdf1ed506 cs:33 sp:7f3dacf9f8e8 ax:ffffffffff600000 si:7f3dacf9fe08 di:ffffffffff600000 [562235.437493] exe[324682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566ed525506 cs:33 sp:7fbbb99638e8 ax:ffffffffff600000 si:7fbbb9963e08 di:ffffffffff600000 [562315.329177] exe[877481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562516a0d506 cs:33 sp:7ff5537fe8e8 ax:ffffffffff600000 si:7ff5537fee08 di:ffffffffff600000 [562462.006699] exe[581598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811a8e8 ax:ffffffffff600000 si:7faaa811ae08 di:ffffffffff600000 [563030.556735] exe[700063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f785927506 cs:33 sp:7ec178c4ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563096.192370] exe[713476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dd4aa0506 cs:33 sp:7ee4439b4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563117.680312] exe[454920] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f730238506 cs:33 sp:7f6337f2ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563122.022382] exe[253410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c02072506 cs:33 sp:7fcd721b0f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563202.504539] exe[734200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d93cbdb506 cs:33 sp:7eab72264f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563204.463571] exe[487674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea2aeaa506 cs:33 sp:7fc8d638ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563239.456469] exe[492582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea24a80506 cs:33 sp:7f29a8d8df88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563252.548611] exe[669399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4c9e23506 cs:33 sp:7f07002baf88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563347.858065] exe[760979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6adbb8e8 ax:ffffffffff600000 si:7eef6adbbe08 di:ffffffffff600000 [563348.115273] exe[761015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6adbb8e8 ax:ffffffffff600000 si:7eef6adbbe08 di:ffffffffff600000 [563348.382821] exe[761092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6ad9a8e8 ax:ffffffffff600000 si:7eef6ad9ae08 di:ffffffffff600000 [563348.427443] exe[761096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd1664e506 cs:33 sp:7eef6ad798e8 ax:ffffffffff600000 si:7eef6ad79e08 di:ffffffffff600000 [563493.763407] exe[766587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563548.086856] exe[175391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad91478506 cs:33 sp:7ff70f92ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563651.327994] exe[717543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fdf1ed506 cs:33 sp:7f3dacf9ff88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563692.245805] exe[827783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a5063f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [563928.667976] exe[527702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d17a2506 cs:33 sp:7f447552af88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564155.743607] exe[912188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559305ee3506 cs:33 sp:7fe0fbbd4f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564277.399393] exe[587753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fc0f2f506 cs:33 sp:7fa7dd3e5f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [564955.931500] exe[74429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a50638e8 ax:ffffffffff600000 si:7ec6a5063e08 di:ffffffffff600000 [565179.552296] exe[965371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565179.949700] exe[965291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565180.006039] exe[965078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d264d8e8 ax:ffffffffff600000 si:7f88d264de08 di:ffffffffff600000 [565180.519879] exe[965387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c5cf5f506 cs:33 sp:7f88d266e8e8 ax:ffffffffff600000 si:7f88d266ee08 di:ffffffffff600000 [565202.957241] exe[125909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565203.576486] exe[126012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565203.793934] exe[126057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565213.065073] exe[128012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.187748] exe[128043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.299416] exe[128071] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.502333] exe[128110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.716211] exe[128157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565213.925402] exe[128200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.182363] exe[128260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.372446] exe[128303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.647764] exe[128351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565214.868536] exe[128409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565545.641659] warn_bad_vsyscall: 2 callbacks suppressed [565545.641663] exe[200543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565545.802115] exe[200578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6a28e8 ax:ffffffffff600000 si:7ebf7e6a2e08 di:ffffffffff600000 [565545.905153] exe[200600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f251435506 cs:33 sp:7ebf7e6e48e8 ax:ffffffffff600000 si:7ebf7e6e4e08 di:ffffffffff600000 [565650.588834] exe[806087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e20113506 cs:33 sp:7fb1aa6338e8 ax:ffffffffff600000 si:7fb1aa633e08 di:ffffffffff600000 [565651.548056] exe[223937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9c85d506 cs:33 sp:7ec10f7168e8 ax:ffffffffff600000 si:7ec10f716e08 di:ffffffffff600000 [565656.275280] exe[995258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591200b2506 cs:33 sp:7f49e0a758e8 ax:ffffffffff600000 si:7f49e0a75e08 di:ffffffffff600000 [565670.641593] exe[533377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612d17a2506 cs:33 sp:7f447552a8e8 ax:ffffffffff600000 si:7f447552ae08 di:ffffffffff600000 [565680.670608] exe[942017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562591aa9506 cs:33 sp:7fa81c7ca8e8 ax:ffffffffff600000 si:7fa81c7cae08 di:ffffffffff600000 [565711.713982] exe[39450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563922df506 cs:33 sp:7fc2d96308e8 ax:ffffffffff600000 si:7fc2d9630e08 di:ffffffffff600000 [565723.393446] exe[240669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565723.597603] exe[240730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565723.776304] exe[240786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1f5b67506 cs:33 sp:7ee37ed4c8e8 ax:ffffffffff600000 si:7ee37ed4ce08 di:ffffffffff600000 [565745.549125] exe[60180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56005707d506 cs:33 sp:7faaa811a8e8 ax:ffffffffff600000 si:7faaa811ae08 di:ffffffffff600000 [565748.127760] exe[247187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55982596e506 cs:33 sp:7ec6a50638e8 ax:ffffffffff600000 si:7ec6a5063e08 di:ffffffffff600000 [565775.217923] exe[139169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4700d5506 cs:33 sp:7fd44aa6e8e8 ax:ffffffffff600000 si:7fd44aa6ee08 di:ffffffffff600000 [565803.983493] exe[994231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ad83f506 cs:33 sp:7f17310ce8e8 ax:ffffffffff600000 si:7f17310cee08 di:ffffffffff600000 [566237.558606] exe[360450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56208114b506 cs:33 sp:7fba219538e8 ax:ffffffffff600000 si:7fba21953e08 di:ffffffffff600000 [566237.968366] exe[159828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56208114b506 cs:33 sp:7fba219538e8 ax:ffffffffff600000 si:7fba21953e08 di:ffffffffff600000 [566557.535450] exe[879305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2adf4c506 cs:33 sp:7faf92ffe8e8 ax:ffffffffff600000 si:7faf92ffee08 di:ffffffffff600000 [566769.910937] exe[478419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae429f2506 cs:33 sp:7f5f9663f8e8 ax:ffffffffff600000 si:7f5f9663fe08 di:ffffffffff600000 [566819.445334] exe[492130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566820.268664] exe[492322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566820.440519] exe[492362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566883.919166] exe[507389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.316650] exe[507479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.471352] exe[507514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566884.833022] exe[507580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566885.256115] exe[507673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566885.779782] exe[507790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.201802] exe[507872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.352208] exe[507905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.682504] exe[507972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566886.849451] exe[508013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566888.942392] warn_bad_vsyscall: 11 callbacks suppressed [566888.942396] exe[508464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566889.097463] exe[508496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [566889.528937] exe[508593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd2b582506 cs:33 sp:7eeb73e50f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [568363.529692] exe[477342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647ad83f506 cs:33 sp:7f17310cef88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [568672.310952] exe[927969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d74cced506 cs:33 sp:7eebde1008e8 ax:ffffffffff600000 si:7eebde100e08 di:ffffffffff600000 [569398.096274] exe[984635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.238796] exe[905386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.455647] exe[985520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569398.712720] exe[984806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fdbd1f8506 cs:33 sp:7f223c3a98e8 ax:ffffffffff600000 si:7f223c3a9e08 di:ffffffffff600000 [569910.066428] exe[224762] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569910.632343] exe[201328] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569911.250800] exe[199792] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [569911.813485] exe[203019] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [570047.752780] exe[271961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570047.901856] exe[271997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570048.416861] exe[272111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [570048.579425] exe[272145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d8ca1506 cs:33 sp:7eae143638e8 ax:ffffffffff600000 si:7eae14363e08 di:ffffffffff600000 [571783.707896] exe[487076] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571784.194869] exe[487076] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571784.641959] exe[278135] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571785.127448] exe[291277] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [571905.665462] exe[477150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571905.949738] exe[469117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571906.290789] exe[700975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [571906.593518] exe[711712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648d1b1b506 cs:33 sp:7f66cba868e8 ax:ffffffffff600000 si:7f66cba86e08 di:ffffffffff600000 [573249.078735] exe[41126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dde6d4b506 cs:33 sp:7eb16a15d8e8 ax:ffffffffff600000 si:7eb16a15de08 di:ffffffffff600000 [573584.788940] exe[86626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.067935] exe[35877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.275066] exe[87760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [573585.517506] exe[34805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae6ce0b506 cs:33 sp:7f4a0d4c88e8 ax:ffffffffff600000 si:7f4a0d4c8e08 di:ffffffffff600000 [574483.489974] exe[310091] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574484.192395] exe[309168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574484.969613] exe[308757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574485.635417] exe[308757] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574486.534118] exe[308408] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574487.260864] exe[311273] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574488.003113] exe[311465] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [574663.849412] exe[342694] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574664.302394] exe[308000] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574664.711948] exe[342694] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [574665.348510] exe[308600] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [575187.899280] exe[224246] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [575247.024855] exe[277414] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575553.467527] exe[197272] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575591.877045] exe[569013] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575592.457247] exe[803275] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575592.968759] exe[801325] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575593.529917] exe[801474] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [575675.154505] exe[361785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ada37ce506 cs:33 sp:7f7d8d8cf8e8 ax:ffffffffff600000 si:7f7d8d8cfe08 di:ffffffffff600000 [575736.449633] exe[551110] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575736.884421] exe[550372] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575737.480809] exe[550716] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575738.124617] exe[598048] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [575989.495086] exe[216100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b8d8752506 cs:33 sp:7f5b7f7568e8 ax:ffffffffff600000 si:7f5b7f756e08 di:ffffffffff600000 [576914.270717] exe[826145] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [576948.990859] exe[768466] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [576995.198628] exe[883126] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [577128.537897] exe[727305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e0ca7506 cs:33 sp:7f6d414e08e8 ax:ffffffffff600000 si:7f6d414e0e08 di:ffffffffff600000 [577561.479383] host.test[23526] bad frame in rt_sigreturn frame:00000000fcda1e47 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [577626.084294] exe[10945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.259175] exe[10910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.420687] exe[920683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [577626.582843] exe[920600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563479a0a506 cs:33 sp:7f82eb9a98e8 ax:ffffffffff600000 si:7f82eb9a9e08 di:ffffffffff600000 [578199.863372] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.033994] exe[182981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.212239] exe[144035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578200.346583] exe[95879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6d2ff506 cs:33 sp:7f26b4f488e8 ax:ffffffffff600000 si:7f26b4f48e08 di:ffffffffff600000 [578487.159477] exe[262460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.312160] exe[262504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.487644] exe[262547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578487.638700] exe[262585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d07f6d506 cs:33 sp:7ed9435208e8 ax:ffffffffff600000 si:7ed943520e08 di:ffffffffff600000 [578951.720832] exe[98210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578951.956263] exe[193426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578952.347284] exe[194912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [578952.608336] exe[98338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d9a010506 cs:33 sp:7f4f830588e8 ax:ffffffffff600000 si:7f4f83058e08 di:ffffffffff600000 [579002.461601] exe[382150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579003.052898] exe[379369] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579003.562211] exe[380026] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579004.068875] exe[382150] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579004.531662] exe[379608] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579005.024654] exe[384563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579005.507296] exe[384563] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [579229.309326] exe[408109] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579229.831515] exe[109736] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579230.323074] exe[111129] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579230.954406] exe[110567] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [579510.928986] exe[345960] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579511.512040] exe[380026] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579512.083522] exe[498579] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [579512.722480] exe[402636] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [580028.459609] exe[478967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580028.816291] exe[98709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.209866] exe[98733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.380000] exe[100662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580029.685339] exe[479436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc20778506 cs:33 sp:7f561a1ed8e8 ax:ffffffffff600000 si:7f561a1ede08 di:ffffffffff600000 [580029.767071] exe[291282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580029.794074] exe[98733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039f93f506 cs:33 sp:7f08df98f8e8 ax:ffffffffff600000 si:7f08df98fe08 di:ffffffffff600000 [580029.813783] exe[291299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ed4554506 cs:33 sp:7fc6e68408e8 ax:ffffffffff600000 si:7fc6e6840e08 di:ffffffffff600000 [580030.084346] exe[98586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ef9d78506 cs:33 sp:7f13a7ef58e8 ax:ffffffffff600000 si:7f13a7ef5e08 di:ffffffffff600000 [580030.185927] exe[249969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56039f93f506 cs:33 sp:7f08df98f8e8 ax:ffffffffff600000 si:7f08df98fe08 di:ffffffffff600000 [581295.046970] warn_bad_vsyscall: 3 callbacks suppressed [581295.046973] exe[888832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635b1ae3506 cs:33 sp:7edc9bb648e8 ax:ffffffffff600000 si:7edc9bb64e08 di:ffffffffff600000 [581328.251546] exe[886592] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581328.858427] exe[888340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581329.433744] exe[887148] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581330.199701] exe[888340] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581857.779362] exe[863870] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581858.246016] exe[858353] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581858.759851] exe[835298] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [581859.186794] exe[859828] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [582230.216780] exe[24614] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582231.089910] exe[24614] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582231.714519] exe[17787] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582232.248110] exe[49529] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [582898.138584] exe[224431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582898.635783] exe[228931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582898.919425] exe[224431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [582899.276316] exe[224387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c8d82a2506 cs:33 sp:7f0bd47618e8 ax:ffffffffff600000 si:7f0bd4761e08 di:ffffffffff600000 [583078.653375] exe[11366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583078.827101] exe[254379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583079.016815] exe[254089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583079.687464] exe[946356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56391bdb7506 cs:33 sp:7f7658b1d8e8 ax:ffffffffff600000 si:7f7658b1de08 di:ffffffffff600000 [583227.716314] exe[936152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562b95c4506 cs:33 sp:7f55b73118e8 ax:ffffffffff600000 si:7f55b7311e08 di:ffffffffff600000 [583426.305485] exe[67248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a68979b506 cs:33 sp:7f5072ffe8e8 ax:ffffffffff600000 si:7f5072ffee08 di:ffffffffff600000 [583454.290849] exe[255687] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [583480.181023] exe[336017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9c41d378 cs:33 sp:7ee428fecf90 ax:7ee428fed020 si:ffffffffff600000 di:562d9c4e7263 [583480.371169] exe[336055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d9c41d378 cs:33 sp:7ee428fcbf90 ax:7ee428fcc020 si:ffffffffff600000 di:562d9c4e7263 [583483.043351] exe[336522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3ee64c378 cs:33 sp:7ea63ebfef90 ax:7ea63ebff020 si:ffffffffff600000 di:55c3ee716263 [583495.372738] exe[128161] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [583846.554415] exe[269507] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [584222.358320] exe[397232] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [584456.247788] exe[396406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584456.449545] exe[984697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584456.623509] exe[305262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649ed8cb506 cs:33 sp:7f0d3357d8e8 ax:ffffffffff600000 si:7f0d3357de08 di:ffffffffff600000 [584466.027704] exe[136724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584466.150193] exe[982596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584466.299049] exe[56597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556039edc506 cs:33 sp:7fc30a66e8e8 ax:ffffffffff600000 si:7fc30a66ee08 di:ffffffffff600000 [584775.716537] exe[481827] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [584808.112724] exe[458048] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [585222.860500] exe[530169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb55b98506 cs:33 sp:7f21b07fd8e8 ax:ffffffffff600000 si:7f21b07fde08 di:ffffffffff600000 [585315.054088] exe[581751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e16a6c506 cs:33 sp:7ff99f62c8e8 ax:ffffffffff600000 si:7ff99f62ce08 di:ffffffffff600000 [585435.397665] exe[536719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1ca895506 cs:33 sp:7fee055e28e8 ax:ffffffffff600000 si:7fee055e2e08 di:ffffffffff600000 [585901.839725] exe[638902] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [585902.237435] exe[635935] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [585902.491774] exe[588918] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [590546.939808] exe[245497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721fe8e8 ax:ffffffffff600000 si:7f81721fee08 di:ffffffffff600000 [590547.254216] exe[258086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721fe8e8 ax:ffffffffff600000 si:7f81721fee08 di:ffffffffff600000 [590547.256133] exe[250014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721dd8e8 ax:ffffffffff600000 si:7f81721dde08 di:ffffffffff600000 [590547.591247] exe[245497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56114555c506 cs:33 sp:7f81721bc8e8 ax:ffffffffff600000 si:7f81721bce08 di:ffffffffff600000 [591142.599187] exe[147787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d93aa1378 cs:33 sp:7f2d2c89bf90 ax:7f2d2c89c020 si:ffffffffff600000 di:563d93b6b263 [591142.825767] exe[139199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d93aa1378 cs:33 sp:7f2d2c89bf90 ax:7f2d2c89c020 si:ffffffffff600000 di:563d93b6b263 [591143.075618] exe[276699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d93aa1378 cs:33 sp:7f2d2c89bf90 ax:7f2d2c89c020 si:ffffffffff600000 di:563d93b6b263 [593446.770740] exe[617183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a99b7d8506 cs:33 sp:7f7ca48758e8 ax:ffffffffff600000 si:7f7ca4875e08 di:ffffffffff600000 [593447.369414] exe[675116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a99b7d8506 cs:33 sp:7f7ca48338e8 ax:ffffffffff600000 si:7f7ca4833e08 di:ffffffffff600000 [593447.635030] exe[675116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a99b7d8506 cs:33 sp:7f7ca48758e8 ax:ffffffffff600000 si:7f7ca4875e08 di:ffffffffff600000 [594512.304700] exe[658457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594512.651561] exe[668464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594512.846434] exe[668514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594792.253871] exe[680152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594792.547689] exe[684324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c518f8e8 ax:ffffffffff600000 si:7f77c518fe08 di:ffffffffff600000 [594792.779373] exe[671406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda76b0506 cs:33 sp:7f77c516e8e8 ax:ffffffffff600000 si:7f77c516ee08 di:ffffffffff600000 [595341.418404] exe[717986] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [595342.408931] exe[717986] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [595342.969067] exe[287168] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [595372.282577] exe[929253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563574805506 cs:33 sp:7fd40cc678e8 ax:ffffffffff600000 si:7fd40cc67e08 di:ffffffffff600000 [595377.900541] exe[655012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a118d506 cs:33 sp:7f97febb68e8 ax:ffffffffff600000 si:7f97febb6e08 di:ffffffffff600000 [595487.573097] exe[655269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cefb011506 cs:33 sp:7ff8771cb8e8 ax:ffffffffff600000 si:7ff8771cbe08 di:ffffffffff600000 [595493.593395] exe[866474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5655530b0506 cs:33 sp:7fe9ee7fe8e8 ax:ffffffffff600000 si:7fe9ee7fee08 di:ffffffffff600000 [595499.152451] exe[55212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56227c2ba506 cs:33 sp:7eabd92e18e8 ax:ffffffffff600000 si:7eabd92e1e08 di:ffffffffff600000 [595524.633559] exe[645469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e036f87506 cs:33 sp:7efe87b838e8 ax:ffffffffff600000 si:7efe87b83e08 di:ffffffffff600000 [595559.212453] exe[64457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cdf8df506 cs:33 sp:7ec684d2c8e8 ax:ffffffffff600000 si:7ec684d2ce08 di:ffffffffff600000 [595588.794732] exe[39615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556293de7506 cs:33 sp:7fa5e12bb8e8 ax:ffffffffff600000 si:7fa5e12bbe08 di:ffffffffff600000 [595659.159318] exe[38813] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eeefe0506 cs:33 sp:7ff4539208e8 ax:ffffffffff600000 si:7ff453920e08 di:ffffffffff600000 [595731.581750] exe[713936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9f1b2506 cs:33 sp:7ff5e50c48e8 ax:ffffffffff600000 si:7ff5e50c4e08 di:ffffffffff600000 [595872.956462] exe[900445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e229ca506 cs:33 sp:7f9c692d88e8 ax:ffffffffff600000 si:7f9c692d8e08 di:ffffffffff600000 [596001.876509] exe[129425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55811a778506 cs:33 sp:7eb2e2c378e8 ax:ffffffffff600000 si:7eb2e2c37e08 di:ffffffffff600000 [596433.490303] exe[166229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647a6d2e506 cs:33 sp:7f9b1c3c08e8 ax:ffffffffff600000 si:7f9b1c3c0e08 di:ffffffffff600000 [596433.795755] exe[171204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647a6d2e506 cs:33 sp:7f9b1c3c08e8 ax:ffffffffff600000 si:7f9b1c3c0e08 di:ffffffffff600000 [596434.010722] exe[167108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647a6d2e506 cs:33 sp:7f9b1c37e8e8 ax:ffffffffff600000 si:7f9b1c37ee08 di:ffffffffff600000 [596640.078550] exe[154906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596640.353806] exe[870376] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596640.803977] exe[836494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596640.882441] exe[836805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621545f2506 cs:33 sp:7f5c6b6b08e8 ax:ffffffffff600000 si:7f5c6b6b0e08 di:ffffffffff600000 [596687.915753] exe[225126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6403b506 cs:33 sp:7f9e55aa68e8 ax:ffffffffff600000 si:7f9e55aa6e08 di:ffffffffff600000 [598916.065958] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598916.208956] exe[543503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63641f90 ax:7f9e63642020 si:ffffffffff600000 di:555e12a99263 [598916.410141] exe[543372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63620f90 ax:7f9e63621020 si:ffffffffff600000 di:555e12a99263 [598919.549652] exe[543370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598919.873944] exe[543372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.081198] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.356020] exe[543352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.715376] exe[391575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598920.855682] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.075808] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.317408] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.682702] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598921.924719] exe[543505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.017581] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.238046] exe[543352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.402443] exe[543352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.599624] exe[497342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.764652] exe[552125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [598922.924085] exe[543370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e129cf378 cs:33 sp:7f9e63662f90 ax:7f9e63663020 si:ffffffffff600000 di:555e12a99263 [599389.601073] warn_bad_vsyscall: 16 callbacks suppressed [599389.601076] exe[360810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581032da506 cs:33 sp:7fd7210758e8 ax:ffffffffff600000 si:7fd721075e08 di:ffffffffff600000 [599390.219611] exe[360810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581032da506 cs:33 sp:7fd7210338e8 ax:ffffffffff600000 si:7fd721033e08 di:ffffffffff600000 [599390.557659] exe[505669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581032da506 cs:33 sp:7fd7210758e8 ax:ffffffffff600000 si:7fd721075e08 di:ffffffffff600000 [599825.530357] exe[563331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c527d7506 cs:33 sp:7f251bb9d8e8 ax:ffffffffff600000 si:7f251bb9de08 di:ffffffffff600000 [599825.809696] exe[557155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c527d7506 cs:33 sp:7f251bb9d8e8 ax:ffffffffff600000 si:7f251bb9de08 di:ffffffffff600000 [599826.407055] exe[636684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c527d7506 cs:33 sp:7f251bb9d8e8 ax:ffffffffff600000 si:7f251bb9de08 di:ffffffffff600000 [600816.429712] exe[840378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651f26d6506 cs:33 sp:7ef1484858e8 ax:ffffffffff600000 si:7ef148485e08 di:ffffffffff600000 [600816.604589] exe[840423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651f26d6506 cs:33 sp:7ef1484858e8 ax:ffffffffff600000 si:7ef148485e08 di:ffffffffff600000 [600816.754993] exe[840483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651f26d6506 cs:33 sp:7ef1484858e8 ax:ffffffffff600000 si:7ef148485e08 di:ffffffffff600000 [600897.114747] exe[844082] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [600897.539004] exe[839723] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [600897.643342] exe[834898] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [600897.899899] exe[845377] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [601657.686976] exe[789516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.841259] exe[788765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.876014] exe[788765] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.910648] exe[926778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.939051] exe[926778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.969764] exe[800114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601657.999165] exe[800114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601658.027831] exe[804277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601658.069096] exe[837718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [601658.099513] exe[837718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55779af48506 cs:33 sp:7fe85856af88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [602540.523437] warn_bad_vsyscall: 25 callbacks suppressed [602540.523440] exe[903262] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [602541.340153] exe[902908] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [602541.963293] exe[26266] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [602542.256552] exe[883346] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [603003.641393] exe[1998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e93078e8 ax:ffffffffff600000 si:7f59e9307e08 di:ffffffffff600000 [603003.939371] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603003.963002] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603003.986561] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.018570] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.043318] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.075402] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.096570] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.127746] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603004.151002] exe[944000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559653962506 cs:33 sp:7f59e92e68e8 ax:ffffffffff600000 si:7f59e92e6e08 di:ffffffffff600000 [603597.338758] warn_bad_vsyscall: 57 callbacks suppressed [603597.338761] exe[213229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603597.492304] exe[213254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603597.579116] exe[213268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47418e8 ax:ffffffffff600000 si:7ea5d4741e08 di:ffffffffff600000 [603597.768919] exe[213278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603608.789111] exe[214752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603608.941876] exe[214757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.099752] exe[214766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.229112] exe[214778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.360794] exe[214794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.568677] exe[214816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.682548] exe[214836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.776530] exe[214855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603609.955351] exe[214876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [603610.103391] exe[214890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [605794.080303] warn_bad_vsyscall: 4 callbacks suppressed [605794.080307] exe[902552] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [605794.929091] exe[903794] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [605927.393014] exe[330831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564af9779378 cs:33 sp:7f3193dd4f90 ax:7f3193dd5020 si:ffffffffff600000 di:564af9843263 [605927.686028] exe[231725] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564af9779378 cs:33 sp:7f3193dd4f90 ax:7f3193dd5020 si:ffffffffff600000 di:564af9843263 [605927.934758] exe[248372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564af9779378 cs:33 sp:7f3193d92f90 ax:7f3193d93020 si:ffffffffff600000 di:564af9843263 [606176.290336] exe[561787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f2584981f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606178.228764] exe[312987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f2584981f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606178.305242] exe[313050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f258493ff88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606178.606970] exe[313023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecee593506 cs:33 sp:7f2584981f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [606352.433370] exe[67824] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [606353.181452] exe[845824] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [606354.432655] exe[851790] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [606465.417018] exe[615259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [606465.481226] exe[615263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [606465.527098] exe[615263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47838e8 ax:ffffffffff600000 si:7ea5d4783e08 di:ffffffffff600000 [606465.628693] exe[615283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee4519506 cs:33 sp:7ea5d47628e8 ax:ffffffffff600000 si:7ea5d4762e08 di:ffffffffff600000 [607267.731134] exe[246573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d6d49506 cs:33 sp:7fad5e0b68e8 ax:ffffffffff600000 si:7fad5e0b6e08 di:ffffffffff600000 [607267.824262] exe[246514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d6d49506 cs:33 sp:7fad5e0b68e8 ax:ffffffffff600000 si:7fad5e0b6e08 di:ffffffffff600000 [607267.916459] exe[253835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626d6d49506 cs:33 sp:7fad5e0b68e8 ax:ffffffffff600000 si:7fad5e0b6e08 di:ffffffffff600000 [607268.035258] exe[246384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.180500] exe[246767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.349323] exe[283481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.505287] exe[337565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.691248] exe[246448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607268.882670] exe[337552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [607269.058607] exe[337552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b727098506 cs:33 sp:7f253215a8e8 ax:ffffffffff600000 si:7f253215ae08 di:ffffffffff600000 [613038.512613] exe[604929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c1222f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [613038.788749] exe[553210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c1222f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [613039.167612] exe[678622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c0dfef88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [613039.169468] exe[604915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560da2942506 cs:33 sp:7f25c1222f88 ax:ffffffffff600000 si:200005c0 di:ffffffffff600000 [614281.809844] exe[862258] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.540737] exe[856393] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.672280] exe[829663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.731119] exe[829663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.789957] exe[829663] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.893138] exe[775988] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614284.961402] exe[763337] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614285.017564] exe[763290] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614285.088066] exe[775988] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614285.125357] exe[861251] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614287.953053] warn_bad_vsyscall: 24 callbacks suppressed [614287.953055] exe[861132] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614287.957398] exe[852527] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [614643.287010] exe[535192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b415aa7378 cs:33 sp:7f14ba33bf90 ax:7f14ba33c020 si:ffffffffff600000 di:55b415b71263 [614644.290530] exe[555700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b415aa7378 cs:33 sp:7f14ba31af90 ax:7f14ba31b020 si:ffffffffff600000 di:55b415b71263 [614645.347267] exe[529876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b415aa7378 cs:33 sp:7f14ba35cf90 ax:7f14ba35d020 si:ffffffffff600000 di:55b415b71263 [619159.063150] exe[109073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966eaa78e8 ax:ffffffffff600000 si:7f966eaa7e08 di:ffffffffff600000 [619159.401510] exe[69214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966eaa78e8 ax:ffffffffff600000 si:7f966eaa7e08 di:ffffffffff600000 [619159.600815] exe[73140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966ea658e8 ax:ffffffffff600000 si:7f966ea65e08 di:ffffffffff600000 [619171.596202] exe[247300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97abad506 cs:33 sp:7f966eaa78e8 ax:ffffffffff600000 si:7f966eaa7e08 di:ffffffffff600000 [619797.473116] exe[662052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8eb88e8 ax:ffffffffff600000 si:7eb9a8eb8e08 di:ffffffffff600000 [619798.447569] exe[662198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8eb88e8 ax:ffffffffff600000 si:7eb9a8eb8e08 di:ffffffffff600000 [619798.514658] exe[662214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a89dd8e8 ax:ffffffffff600000 si:7eb9a89dde08 di:ffffffffff600000 [619799.358732] exe[662318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8eb88e8 ax:ffffffffff600000 si:7eb9a8eb8e08 di:ffffffffff600000 [619799.358764] exe[662319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558515dc5506 cs:33 sp:7eb9a8e978e8 ax:ffffffffff600000 si:7eb9a8e97e08 di:ffffffffff600000 [620740.520979] exe[811290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.688096] exe[811309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.734802] exe[811309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.888259] exe[811334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9ccc28e8 ax:ffffffffff600000 si:7efb9ccc2e08 di:ffffffffff600000 [620740.907729] exe[811335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a5187506 cs:33 sp:7efb9cca18e8 ax:ffffffffff600000 si:7efb9cca1e08 di:ffffffffff600000 [621720.141313] exe[926934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [621720.373119] exe[906134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [621720.540044] exe[926822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [621720.692736] exe[939094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df245b0506 cs:33 sp:7fb9130e88e8 ax:ffffffffff600000 si:7fb9130e8e08 di:ffffffffff600000 [622452.637541] exe[113664] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622453.570724] exe[113664] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622454.466141] exe[142434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622455.150738] exe[142462] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622455.773241] exe[115073] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622456.145988] exe[122756] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [622456.550961] exe[142434] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [623017.338543] exe[295402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [623017.570252] exe[293065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [623017.778821] exe[293433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [623017.985635] exe[295610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d079260506 cs:33 sp:7faf83ba98e8 ax:ffffffffff600000 si:7faf83ba9e08 di:ffffffffff600000 [624099.677229] exe[522197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624100.317434] exe[514418] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624101.186437] exe[334114] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624102.002656] exe[460123] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624103.109991] exe[522197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624104.060775] exe[522197] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [624104.969752] exe[512102] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [625084.297149] exe[670912] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [625084.632849] exe[655452] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [625084.931744] exe[674116] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [625085.348162] exe[674116] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000